Behavioral task
behavioral1
Sample
2c5be3b212f1127cb098ff88c9def15a_JaffaCakes118.doc
Resource
win7-20240220-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c5be3b212f1127cb098ff88c9def15a_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
2c5be3b212f1127cb098ff88c9def15a_JaffaCakes118
-
Size
208KB
-
MD5
2c5be3b212f1127cb098ff88c9def15a
-
SHA1
47ffe7c65287f949d910bf03983c04d5ffaa2140
-
SHA256
ff1a6dcb142cf7e810d2eeb485b309fcceba969fceebe6651faa55d43a376282
-
SHA512
ac8a3a5cf57a676c015bf027e0fd11a9f6f5263d4936fa655ec6a83feb14078eccfacb766484d9204f0a94403e00ed61f3076a4fa04ba24dc54c0e3e257585dc
-
SSDEEP
3072:CwAEqqoboYJvnr7mq2YTN0Q7ueYMMuL8P9eD8niRf:CIoboSvnfXrN0Zug1F
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2c5be3b212f1127cb098ff88c9def15a_JaffaCakes118.doc windows office2003
ukXAaoFOsDK
fJmFIQv
EtowDrwSkcEic
VBsdUrIzp
zOSGuFu