Behavioral task
behavioral1
Sample
418ef733a99927832f9380a86cc9d52f_JaffaCakes118.doc
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
418ef733a99927832f9380a86cc9d52f_JaffaCakes118.doc
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
418ef733a99927832f9380a86cc9d52f_JaffaCakes118
-
Size
14KB
-
MD5
418ef733a99927832f9380a86cc9d52f
-
SHA1
26eaf7faf4733c1fc042a6a3ade8bcaa64eb9689
-
SHA256
e9c5ae8b92c061655f72ca82e333cd73a07627052987d00c6280043c8f94b3a4
-
SHA512
918448f2f2abe0061e95f2f5b9866144f7ab8a16b48813bf98dc27b168204ab13a56cd4ab2dac48e811eb7b31593356da741c2c8b7df8c12aa2444affa125fb8
-
SSDEEP
192:v/QqgAn/uTgd0j2z82vkCLnlEC+pfVT8M6HntbQNisga:Rzn2gd0jU8ak2+p9cHt6
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
418ef733a99927832f9380a86cc9d52f_JaffaCakes118.doc windows office2003