Behavioral task
behavioral1
Sample
40f113b4a34bf39c01d17bf60ac2f096_JaffaCakes118.doc
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
40f113b4a34bf39c01d17bf60ac2f096_JaffaCakes118.doc
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
40f113b4a34bf39c01d17bf60ac2f096_JaffaCakes118
-
Size
11KB
-
MD5
40f113b4a34bf39c01d17bf60ac2f096
-
SHA1
288063228c59b9d17b2cece8f69db05d02f10bc6
-
SHA256
c284d695c5ec2782a3add1432693f269267737d5c98ef35d903d87eac505c304
-
SHA512
c711f87d096632ef11d2b31e9e6a9e9c49e4db9cd1488271a1be26a1bc3828c8331a32b09a69d67d7bd76a561ecc4a32160360bd943edf528dece1a80950b62c
-
SSDEEP
192:BOE0j3+KfA10+BtkRsKVcU5EFwICCkUlmaa:QE0j3zortYsdU5ECISUw
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
40f113b4a34bf39c01d17bf60ac2f096_JaffaCakes118.doc windows office2003
ThisDocument