Behavioral task
behavioral1
Sample
0a080a3f9528a6a340f28fa17968c059_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a080a3f9528a6a340f28fa17968c059_JaffaCakes118.doc
Resource
win10v2004-20240419-en
8 signatures
150 seconds
General
-
Target
0a080a3f9528a6a340f28fa17968c059_JaffaCakes118
-
Size
268KB
-
MD5
0a080a3f9528a6a340f28fa17968c059
-
SHA1
f7196348bbefaaa6837d3939fdb97707537a1bfc
-
SHA256
157a544c2bc4ebce2537a8d66f1dc25f6c8a3915c1fae76f991748f2eade8960
-
SHA512
d5d34f1848c005c7c72f9709dd8f84a275fea639e44ba16765489ddf8f4066371a4822d491d0fedc88cbbb66a9e4cad22677c500783711a5bf44fdd83606081e
-
SSDEEP
6144:cCwQK3RpVS7G4SVuz1QzLhxztsZGPwtM:eQQLGSVuz1QHhxztCtM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0a080a3f9528a6a340f28fa17968c059_JaffaCakes118.doc windows office2003
ThisDocument
GXbkFnp
PFUGY
Hx2KATO
f