Behavioral task
behavioral1
Sample
Sales-Invoice.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Sales-Invoice.doc
Resource
win10v2004-20240426-en
7 signatures
150 seconds
General
-
Target
330c62fe6882b3fb742ca1658dbacc12_JaffaCakes118
-
Size
70KB
-
MD5
330c62fe6882b3fb742ca1658dbacc12
-
SHA1
4799be7a453f474863961a32b75ef134e3d3290b
-
SHA256
94ffbfc022864d305c972b0cc65fca5b7607b9e6f2b83ccc4792452825609e51
-
SHA512
bebc7631d03afacc8c8ba871a94148769d29640dbc71c799a46910c42b83264799469a0fbdc89d30d01d7778712cfffcb661221fecea6d9d00daac4c5c043e41
-
SSDEEP
1536:wPbcaG2+qFT5IquF/NjsHHuRx2HXubQsYFwEW9VAptX2/f39:8Qt2+qtKqsCHXubzYank/X2/f39
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Sales-Invoice office_macro_on_action -
resource static1/unpack001/Sales-Invoice
Files
-
330c62fe6882b3fb742ca1658dbacc12_JaffaCakes118.zip
Password: infected
-
Sales-Invoice.doc windows office2003
ThisDocument
tjoBOjhrc
LtBGCGKTX
PjosAuOPV
zENALwT