Behavioral task
behavioral1
Sample
2ca559932ba44cf0ee0ccdd1e0858910_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ca559932ba44cf0ee0ccdd1e0858910_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
2ca559932ba44cf0ee0ccdd1e0858910_JaffaCakes118
-
Size
139KB
-
MD5
2ca559932ba44cf0ee0ccdd1e0858910
-
SHA1
d1d04e803554ec6b2c2a7e939c70bff84137dc76
-
SHA256
827f677f0525c6f6db13c8c2b9c0bb8b030e141ec28792d67e8b62fda46ee7a7
-
SHA512
94ba56b549ff5f9f338d9526d9e5e6d0f8bf3ea369e64d8e2f639d714561c461ca46f5379bbe1ab865b576b610bba12a65d6ead2af56a753327e128b7881d7e0
-
SSDEEP
3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2ca559932ba44cf0ee0ccdd1e0858910_JaffaCakes118.doc windows office2003
HXbEGlvJu