Behavioral task
behavioral1
Sample
24e560359ac697d94057d7398b57672c_JaffaCakes118.doc
Resource
win7-20240215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
24e560359ac697d94057d7398b57672c_JaffaCakes118.doc
Resource
win10v2004-20240419-en
8 signatures
150 seconds
General
-
Target
24e560359ac697d94057d7398b57672c_JaffaCakes118
-
Size
149KB
-
MD5
24e560359ac697d94057d7398b57672c
-
SHA1
4fa2f42f40eab87b42de0edde34227bd4dd1847c
-
SHA256
feddf3a2c587835ef03d880773cca17831fb694d733a4464681cb6b77ee03830
-
SHA512
3aff763a22dec9a1a9a4b67aa0cd79a230101a59e61c4dcd820a8f2e98ef1d5b25938d2545db1adc6f750b583e034ae0129bcf7d1efa0f3c560ae6302a984819
-
SSDEEP
3072:5VNx3L9Q7YV/o5Do7HR/GfFPlYvPc2gR:zNxbC7YV/omalYvk2S
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
24e560359ac697d94057d7398b57672c_JaffaCakes118.doc windows office2003
LXkzdYWYjvWjR
UIhEzNLZzWDXzn