Behavioral task
behavioral1
Sample
373fa78ee18e3f7ceef5bbec561c93a7_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
373fa78ee18e3f7ceef5bbec561c93a7_JaffaCakes118.doc
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
373fa78ee18e3f7ceef5bbec561c93a7_JaffaCakes118
-
Size
87KB
-
MD5
373fa78ee18e3f7ceef5bbec561c93a7
-
SHA1
21bde67f4543b024e4261a4ee1c17a2d33785775
-
SHA256
2698ae7c27343ccc5c3344f9b29f4d86cf84a014f4908567c493085c54b880f2
-
SHA512
ffe88917e025560d61b3a953d2a244726adefa5582e1ed37c248e8e139505ac7787fb4678b94d7cfc9fd5ac3d5291ff6ceacde3cc681e17b5a959ba0c6f17d9e
-
SSDEEP
1536:LptJlmrJpmxlRw99NBU+atQJOYE8iJk1ZucDg+Pud:Fte2dw99fD+8iJkb9Pu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
373fa78ee18e3f7ceef5bbec561c93a7_JaffaCakes118.doc windows office2003
HMQYWlKi
lHjrUoaS
fkluKFjpc