Behavioral task
behavioral1
Sample
2a0ea855ac0a86ffad8ff42ffa39fe78_JaffaCakes118.doc
Resource
win7-20240215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a0ea855ac0a86ffad8ff42ffa39fe78_JaffaCakes118.doc
Resource
win10v2004-20240508-en
11 signatures
150 seconds
General
-
Target
2a0ea855ac0a86ffad8ff42ffa39fe78_JaffaCakes118
-
Size
97KB
-
MD5
2a0ea855ac0a86ffad8ff42ffa39fe78
-
SHA1
aa08f86b32f6ec49b3fe730c65efbd9c14d7351e
-
SHA256
ed1138107ccad1d96ae3c2e629502350589855314fb22d15ce2243ea27b9dfbc
-
SHA512
4c0e8fef76ee763ada85542dda04345f557b7744f0ae41f39f09fbcaec876f26ca2e44f13bae7b7dbaff82e7c08e9afe28882090e8228d3bfdba3b2d73f10863
-
SSDEEP
1536:GTxjwKZ09cB7y9ghN8+mQ90MTA+aKL+s/5OG:+xjnB29gb8onj5
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2a0ea855ac0a86ffad8ff42ffa39fe78_JaffaCakes118.doc windows office2003
MmazDcCwmYFJ
iCFPfdGTShhz