Behavioral task
behavioral1
Sample
260469814ec3b84e93bf7aecf7142943_JaffaCakes118.doc
Resource
win7-20240215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
260469814ec3b84e93bf7aecf7142943_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
260469814ec3b84e93bf7aecf7142943_JaffaCakes118
-
Size
68KB
-
MD5
260469814ec3b84e93bf7aecf7142943
-
SHA1
9dc6b9f7438c1647483ad09f5b78f2efdc4ccca3
-
SHA256
ab46ed2a7de810345eef54d40f2a782021555022bcb84c9063c4165038cc0b3b
-
SHA512
66a2e4004a5a82fee0245c589b58c309542182b1a20657f67aa0acd359012e785f31fb0e38a9a98098bf13bdb543d703fb873c2c0dff9831c56004b1bce2510e
-
SSDEEP
1536:rptJlmrJpmxlRw99NBs+anBRHC/EX62Q:lte2dw99fwPX6X
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
260469814ec3b84e93bf7aecf7142943_JaffaCakes118.doc windows office2003
IwplAskkuqPSsw
LRtSDBcrCE