Behavioral task
behavioral1
Sample
13644af1415a6093221b2d0c101e6a53_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
13644af1415a6093221b2d0c101e6a53_JaffaCakes118.doc
Resource
win10v2004-20240419-en
10 signatures
150 seconds
General
-
Target
13644af1415a6093221b2d0c101e6a53_JaffaCakes118
-
Size
188KB
-
MD5
13644af1415a6093221b2d0c101e6a53
-
SHA1
48a2c86129ed8292624cc700b98b36984f8016c9
-
SHA256
7c1911444c109ebedde7d57174142baab688364a8607dd49ccf44d8dd005cc6b
-
SHA512
a305137bbc72706ddd8f03a70f47f435167876095fc738ad524edf171665084f94a479537f23e9d326f406f66a08b930e04d740e4e31475694d401f7b083ac23
-
SSDEEP
3072:qte2dw99f3atYoUO2ALf7srqbIpRBFYBINwPk/adpii:yHdw7MiODLV80INwPk/adD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
13644af1415a6093221b2d0c101e6a53_JaffaCakes118.doc windows office2003
UhjoXOF
VtSiQMAjXW
SrNpqQDuvFp