Behavioral task
behavioral1
Sample
137036aac36fdb0d7d0a523c96878bdb_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
137036aac36fdb0d7d0a523c96878bdb_JaffaCakes118.doc
Resource
win10v2004-20240419-en
10 signatures
150 seconds
General
-
Target
137036aac36fdb0d7d0a523c96878bdb_JaffaCakes118
-
Size
90KB
-
MD5
137036aac36fdb0d7d0a523c96878bdb
-
SHA1
b242ae0d6f726f8ef849e0ac9060b181cf2921b3
-
SHA256
6206dbc718d7903f5e57f62e88e916ec6df883106cf5aa1c0fbe3ed0885d8963
-
SHA512
286bff3617b70b6e093c6eec044c650a6cd655d226c7212d7993b73aedfa62d59d6e65ed0bd597a901409a433fa9b6a628408a3bfba66a9501ae724ac622a8d3
-
SSDEEP
1536:jptJlmrJpmxlRw99NBP+aEQCxaupItj8SWnQt:Nte2dw99flupuj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
137036aac36fdb0d7d0a523c96878bdb_JaffaCakes118.doc windows office2003
VzwjvKOjLzrTt
loVHrOkvhq
BJNpFwluNHIHM