Behavioral task
behavioral1
Sample
35393bd60bfa4170942b872c719ee68f_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
35393bd60bfa4170942b872c719ee68f_JaffaCakes118.doc
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
35393bd60bfa4170942b872c719ee68f_JaffaCakes118
-
Size
88KB
-
MD5
35393bd60bfa4170942b872c719ee68f
-
SHA1
293aa2a3ac8d7a8c034195c8bc600d2b0ee04c4c
-
SHA256
dfc5235971c689d895cf7b019a70305d0a267096db5642e58c96a266dc6ba80b
-
SHA512
309a2bea29d28986c38541ffce6b2503a77450ae9df87ffc2ee88f4e2b780fb0652afd55fb06aa1d5109b3c4d572cd27f3d631cc91c8cc7c7eabf2b862266d21
-
SSDEEP
1536:eptJlmrJpmxlRw99NBPU+ahEjEidLp1qcoo9:yte2dw99fzdLTo2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
35393bd60bfa4170942b872c719ee68f_JaffaCakes118.doc windows office2003
wUfpDMVhqG
liGUhNalVHna