Behavioral task
behavioral1
Sample
2fa0c9d1a72fb052caff82a7397a0c0c_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
2fa0c9d1a72fb052caff82a7397a0c0c_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
2fa0c9d1a72fb052caff82a7397a0c0c_JaffaCakes118
-
Size
75KB
-
MD5
2fa0c9d1a72fb052caff82a7397a0c0c
-
SHA1
2bf3c7377c0a3bcc897ada09631ef36a2645ebaa
-
SHA256
1bad501cba7a1b6abcc8e6ceec1906a621274fdb7df8c37a3d6901ddaa9dc785
-
SHA512
f054812ccb29785988f1486ac83eb6aac4ff1c96e0f1ac177e56bf9ec894c9cf19d8fb572b6d42743ab6c625382fea5168d6fb26461b7cdbeb71e9343ec41871
-
SSDEEP
1536:VptJlmrJpmxlRw99NBE+aGy3CDp1n+xYpKY:rte2dw99fo3mbn+2pZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2fa0c9d1a72fb052caff82a7397a0c0c_JaffaCakes118.doc windows office2003
hBfqbVnmID
RlVbNBNdqzcwzt
RACSTHm