Behavioral task
behavioral1
Sample
129f40d11b0c00deaf69fe177387046f_JaffaCakes118.doc
Resource
win7-20240215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
129f40d11b0c00deaf69fe177387046f_JaffaCakes118.doc
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
129f40d11b0c00deaf69fe177387046f_JaffaCakes118
-
Size
190KB
-
MD5
129f40d11b0c00deaf69fe177387046f
-
SHA1
587537134864a85a5b51688441cb0fa26d88129f
-
SHA256
40e3dc552bebf93340e4bbf7fd6ae305a82d3ac755f06c75e248f7fced5c17aa
-
SHA512
dd2fb0d2ed7d7e6c1dbcad2cb7a2cc22b88d76613155b7f606c622647d5b30b13b84a6d75386a983c38bc0fea19cad8a091d4f1094e65d9fbb2f465641e906c2
-
SSDEEP
3072:z3hR2eSC+ONj6WpF50P/5+jDHda9PYdVh1p:z3hULOtn0XwjDHIPYdVh1
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
129f40d11b0c00deaf69fe177387046f_JaffaCakes118.doc windows office2003
ThisDocument
XUTYflYqDf
dOlXwwJuG
wbciXQiAMLC
DCSYJZtdGq