Behavioral task
behavioral1
Sample
4038a0b75a5f259342c7ee9e85f7244f_JaffaCakes118.doc
Resource
win7-20240221-en
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
4038a0b75a5f259342c7ee9e85f7244f_JaffaCakes118.doc
Resource
win10v2004-20240426-en
11 signatures
150 seconds
General
-
Target
4038a0b75a5f259342c7ee9e85f7244f_JaffaCakes118
-
Size
97KB
-
MD5
4038a0b75a5f259342c7ee9e85f7244f
-
SHA1
13268066313b22e9c8e02addecf4368f1b158eb0
-
SHA256
d91db4a4f6ff2bff6a3ed2f6d237e4d4bb4bab14954a750480c7ff39386932f6
-
SHA512
91d14d9cf86ca9613768d0cfc6b39a15faf2380ee3764aa8edb673cc0f5bac00ce4390b224135395d9d52204af1fe3ac730d3387f2c51dcee0eebc0ea8b13aba
-
SSDEEP
1536:1TxjwKZ09cB7y9ghN8+mQ90MT1+afK4s/4t9i9:VxjnB29gb8onqW9A
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4038a0b75a5f259342c7ee9e85f7244f_JaffaCakes118.doc windows office2003
OAcOimGY
bmTpOWNCpBMY