Behavioral task
behavioral1
Sample
39ad276519875da752702b7532b39ace_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
39ad276519875da752702b7532b39ace_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
39ad276519875da752702b7532b39ace_JaffaCakes118
-
Size
82KB
-
MD5
39ad276519875da752702b7532b39ace
-
SHA1
06719649562c6c2226211d6d539b07a00af9d19d
-
SHA256
f071d16e2fe798a868d07e99261e6885d45778e2624da6180a7b500acc97187a
-
SHA512
3dcfa35de2736af5bfa7cef035ef1bff546db2d7e81f764d80443641e5055960a3b41c77c79f9dd310d4d5a23a396c254c2d397e2924c3389e4041dc5ca8495c
-
SSDEEP
1536:6ptJlmrJpmxlRw99NBUr+af88smJmNbWcWQSdt0i5EH8OrB:mte2dw99fmibWc45c
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
39ad276519875da752702b7532b39ace_JaffaCakes118.doc windows office2003
dvUBfDmnM
wqRDjMiqZU
YSUThhnwpqpF