Behavioral task
behavioral1
Sample
2afc902abff83155c841f28d84ce3a67_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
2afc902abff83155c841f28d84ce3a67_JaffaCakes118.doc
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
2afc902abff83155c841f28d84ce3a67_JaffaCakes118
-
Size
86KB
-
MD5
2afc902abff83155c841f28d84ce3a67
-
SHA1
2c945891d7c4aed87c0e04a4b85e42578923e137
-
SHA256
55295d53c7cd7969ef3d7a6c71d3a978feb697d3eb4574f5c20fc83025a6c6a8
-
SHA512
f1e86a477b69d49824a7ae0613f0fa32207955c9ac76724d69ce675a53e5370330b53f6cd161571db2cfb09b5577b652eb23b8ccc11de2e3a04cb7145196115d
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5guB2DZrVeoBE:Qte2dw99f0uBYZrom
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2afc902abff83155c841f28d84ce3a67_JaffaCakes118.doc windows office2003
dGmbmtWbCXbuEh
WnQTVBapd
AIdTOmiMwSr