Behavioral task
behavioral1
Sample
439f65268772909dd1c3536adc12569a_JaffaCakes118.doc
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
439f65268772909dd1c3536adc12569a_JaffaCakes118.doc
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
439f65268772909dd1c3536adc12569a_JaffaCakes118
-
Size
43KB
-
MD5
439f65268772909dd1c3536adc12569a
-
SHA1
074244b6ca246d9ae440de1a78b27e80c38fd5f0
-
SHA256
ca320bc797c4c76043be0e686624f08fb150063833597257f75cb70043c354bd
-
SHA512
62a42ec4cdb16bca384047731ee5e14d0b3159ff247f5437bcd49e0ab38b9a023c08bb38c5702757a3829cbdeb9fb94ec4f6815271c3c48bee0c0376f813c8e8
-
SSDEEP
768:0vVIR9PmF7BB5OZkxsZu04L53Q5mUEMKO3+FC:0vVSPY7BWZHZunLFwwO3+FC
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
439f65268772909dd1c3536adc12569a_JaffaCakes118.doc windows office2003
ThisDocument
cb7f9
cd46a
c613d