Behavioral task
behavioral1
Sample
3e0a88c8e3f61ab13c504972f116e8c0_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e0a88c8e3f61ab13c504972f116e8c0_JaffaCakes118.doc
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
3e0a88c8e3f61ab13c504972f116e8c0_JaffaCakes118
-
Size
87KB
-
MD5
3e0a88c8e3f61ab13c504972f116e8c0
-
SHA1
466cf4924e62a120f942a28017d1ec737c9d7d66
-
SHA256
0bebbc616c10d4ba758d4139739ec3272be44cd4bf283ceddb5901b7e6233fff
-
SHA512
2486311eb65654650a5b8e6841662e4b982937fd203436602e8fee738402657e6107282bc3165fd38fd5d2623fa10ff8befa61e775b3afcef0bba2d2800bb679
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a55uB2DZrVeoBE:Qte2dw99f1uBYZrom
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3e0a88c8e3f61ab13c504972f116e8c0_JaffaCakes118.doc windows office2003
dGmbmtWbCXbuEh
WnQTVBapd
AIdTOmiMwSr