Behavioral task
behavioral1
Sample
28074bdf5d48d3eb14905450b017e90a_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
28074bdf5d48d3eb14905450b017e90a_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
28074bdf5d48d3eb14905450b017e90a_JaffaCakes118
-
Size
98KB
-
MD5
28074bdf5d48d3eb14905450b017e90a
-
SHA1
406d3661eebc129c5f6f12a5df3e11d1a29620b2
-
SHA256
df1282196a07536dae32ecddac0eb0041232896bbe8142af9b745a835a4a386b
-
SHA512
aa22500f221849248fe4287e81e3c5d005af3ba96942c0e8d49e9e198c9a92fdc21e3db7e7d96174e3dd2453ef3048e4a89a23cb4b2a979a932fa94eec4b2f43
-
SSDEEP
1536:5bs9qkBjc+4JVIAdGA8jd8DqmZ2GXcvqdOOLg6p07gmD:5bKfo9gkHcvqdHLg6p0BD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
28074bdf5d48d3eb14905450b017e90a_JaffaCakes118.doc windows office2003
ThisDocument