Behavioral task
behavioral1
Sample
38234782639d730fcc4e8d09fc9d4f42_JaffaCakes118.doc
Resource
win7-20240419-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
38234782639d730fcc4e8d09fc9d4f42_JaffaCakes118.doc
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
38234782639d730fcc4e8d09fc9d4f42_JaffaCakes118
-
Size
106KB
-
MD5
38234782639d730fcc4e8d09fc9d4f42
-
SHA1
dabc6f7f70cf62012b0b4295ee188003096504ff
-
SHA256
6c78c4b4451a99e7ad5c6f9140b5c553c904f1d261a432aa6353918b5a3bfe29
-
SHA512
b099c72c9a0536ce13199852f542b3d65d398223d1cc95a7ecaf57f6e93c7145a4e5c1b59586a1ace91a606f89e522b1f3203b23ff7c7115c77442a8d18c05f0
-
SSDEEP
1536:RXqfuydIZYQQdR+ByOXig2j7rtNtZgePdFODFO2K:R6WsIZYjbSyOmtNPzWDQr
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
38234782639d730fcc4e8d09fc9d4f42_JaffaCakes118.doc windows office2003