Behavioral task
behavioral1
Sample
4168d24a3cc7e873abbd3f1309a70b1e_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
4168d24a3cc7e873abbd3f1309a70b1e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
4168d24a3cc7e873abbd3f1309a70b1e_JaffaCakes118
-
Size
35KB
-
MD5
4168d24a3cc7e873abbd3f1309a70b1e
-
SHA1
6260c6d9bd4d9c5700526d1ff21aec9088b3531d
-
SHA256
b05b6680219d8242e1830a4e82408a0f412ce1d8271ecf614c204a1ed9fc98f5
-
SHA512
431835df7c048d3a5b192b4dc92f9cb351ab247ec93aec15aa22b11c29760e20b9eccf6ef686f49a90a4879a0c60d4d865b18ac395b89360bf53f664b9bf9dc3
-
SSDEEP
384:iw0iSbOMKKHK1OBxsIbi6sFWG3cBiolk5/zN0j7Me+AtJ:iXKKq1Cy6ss6csol0RoM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4168d24a3cc7e873abbd3f1309a70b1e_JaffaCakes118.doc .vbs windows office2003 polyglot