Behavioral task
behavioral1
Sample
2dbe0f51fc7ae936cf3e2a3092f25b72_JaffaCakes118.doc
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2dbe0f51fc7ae936cf3e2a3092f25b72_JaffaCakes118.doc
Resource
win10v2004-20240426-en
4 signatures
150 seconds
General
-
Target
2dbe0f51fc7ae936cf3e2a3092f25b72_JaffaCakes118
-
Size
66KB
-
MD5
2dbe0f51fc7ae936cf3e2a3092f25b72
-
SHA1
ddd2e0287cb7b3d1f1bfee4f4996476c45971636
-
SHA256
5a5d0a4e5476c54f0432448b11fc50f56308cfd8ccd8385088c8679a257a040a
-
SHA512
5015b2de7fe6cd4bdd2301ea850a97f57ed506379cb8a01379fcd3a4830f095de80fca7973e7eb03a835dc208cd748bbc3fbfc411ac6a9bcd9284f4064ad00f0
-
SSDEEP
768:n7CpqyTc7sGg+YHIZuvY//8N0gbLzEGhyLTbUxp:n2DKnYu8N0cztx
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2dbe0f51fc7ae936cf3e2a3092f25b72_JaffaCakes118.doc windows office2003
ThisDocument
VKhNRx
LLAhsG