Behavioral task
behavioral1
Sample
349e496eb1f18a76975c1945fcbcbf5c_JaffaCakes118.doc
Resource
win7-20240508-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
349e496eb1f18a76975c1945fcbcbf5c_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
349e496eb1f18a76975c1945fcbcbf5c_JaffaCakes118
-
Size
177KB
-
MD5
349e496eb1f18a76975c1945fcbcbf5c
-
SHA1
0f3a6ec83eeceb8a13ae0d9de76816744bf25b81
-
SHA256
d038049d22c876e826cf41e0f69089d9a01654f48790c53202cbfa98bcf8c6eb
-
SHA512
e4486a8636eec71dcf582d26fe6a3b742579246df41d2aa102b1fd0376bd26b0ef68e52767aeb5ab0a90f84d1944f40dd83fbb0c2293b408d551d2cb931cb7a2
-
SSDEEP
3072:06WK3sLZ3uWocH9vh68MSir0UWOR3GzK0mvhn/hIEj5u:NCZ3uWocd48MSmvhiE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
349e496eb1f18a76975c1945fcbcbf5c_JaffaCakes118.doc windows office2003
ThisDocument
mbOAbqH
PmqmjEOlEIon
rdzhtRAboo