Behavioral task
behavioral1
Sample
2452ad99563cbe530e327ceff04bce34_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2452ad99563cbe530e327ceff04bce34_JaffaCakes118.doc
Resource
win10v2004-20240419-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2452ad99563cbe530e327ceff04bce34_JaffaCakes118
-
Size
11KB
-
MD5
2452ad99563cbe530e327ceff04bce34
-
SHA1
093fa64867a535b558625d35b231f0fadf2b9499
-
SHA256
53c0f82a6387a392bc3f5453307542e469013a5db884342d106ddcc4aa7b5f76
-
SHA512
2319d481710982e8a7ff54ec1b0d5d79d9177e7931c83dc71cfe9e6ff1eb3cb80c8bf04968acf55b67ead934aaf9f168badfc650001ed26ba0ff30e06000edc4
-
SSDEEP
192:hzE0jqBwdEt51/fKEab3uSzUnK/tED2XuK0Epa:1E0jquEtj/fHabHUnK/c
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2452ad99563cbe530e327ceff04bce34_JaffaCakes118.doc windows office2003
ThisDocument