Behavioral task
behavioral1
Sample
26528a46f885600a1a7f152ce0db794b_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
26528a46f885600a1a7f152ce0db794b_JaffaCakes118.doc
Resource
win10v2004-20240426-en
9 signatures
150 seconds
General
-
Target
26528a46f885600a1a7f152ce0db794b_JaffaCakes118
-
Size
73KB
-
MD5
26528a46f885600a1a7f152ce0db794b
-
SHA1
8d121fc2ecc8b2fc322b64a4d51c7708562d43d5
-
SHA256
e92dbb35ace0a809f58156546596adc86f808f83d22908c8999fbd84537b2518
-
SHA512
b3805bbc8276932f36753bd856f4b0e8abda07b31fe0a522cee06bf295d9b205af8f648e109b74628b4abb4f6aa6b9daaac86f4359d4680560db304fbe05bfdc
-
SSDEEP
1536:SptJlmrJpmxlRw99NB0s+aGXd6PCGKM9gB:Ote2dw99fwpG/gB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
26528a46f885600a1a7f152ce0db794b_JaffaCakes118.doc windows office2003
MbzVSCiir
jhCtZjWFr