Behavioral task
behavioral1
Sample
35f59e72e4c8d1520d96fea434a751e8_JaffaCakes118.doc
Resource
win7-20240220-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
35f59e72e4c8d1520d96fea434a751e8_JaffaCakes118.doc
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
35f59e72e4c8d1520d96fea434a751e8_JaffaCakes118
-
Size
84KB
-
MD5
35f59e72e4c8d1520d96fea434a751e8
-
SHA1
0e1eeffa13aa9d5dcac035d6e5a7642c10365c11
-
SHA256
af7ebda1f84632b492da6286cb97d6c56eff5938c1b332dae319a24099fb044f
-
SHA512
c59ff978af4882a93c10a3e39d4f625bdb2c24a72f1f9598713e3ef814541b09b4ef36825977f175cbfbe4d71733d50b53343399963e6042d6aa9e49e498c0cf
-
SSDEEP
1536:PptJlmrJpmxlRw99NB2+aNockG2n1jKeOc7Aqx:Bte2dw99fLZ+y
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
35f59e72e4c8d1520d96fea434a751e8_JaffaCakes118.doc windows office2003
NhhDcPmmSlWJ
jRCvWpfn