Behavioral task
behavioral1
Sample
33e63037b35ee989f9ac8cb0f7492ca2_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
33e63037b35ee989f9ac8cb0f7492ca2_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
33e63037b35ee989f9ac8cb0f7492ca2_JaffaCakes118
-
Size
86KB
-
MD5
33e63037b35ee989f9ac8cb0f7492ca2
-
SHA1
db115013c56aa86326cc5a2f2bf8abb2febab111
-
SHA256
bbdfa6d962aad1150dde37e48a8d357c2ca792f938c810e6c21354c4daaa2442
-
SHA512
32f379bb79c8d9ddf181e389bb51862c24ebf0bfc033c4314f651e955784363205794e7f7bdec2ee393d8506517626c7510ba71860bdab472d234bd23c0b1a32
-
SSDEEP
1536:JptJlmrJpmxlRw99NBO+aANIrlnKchqXN076KC0It4oC:3te2dw99fD2vR1It4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
33e63037b35ee989f9ac8cb0f7492ca2_JaffaCakes118.doc windows office2003
QWAVCmbWUGi
vlIoOfNZCBLsbf
jIOiqzzJmz