Behavioral task
behavioral1
Sample
444749249e358f3c67d0abc468b8349c_JaffaCakes118.doc
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
444749249e358f3c67d0abc468b8349c_JaffaCakes118.doc
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
444749249e358f3c67d0abc468b8349c_JaffaCakes118
-
Size
64KB
-
MD5
444749249e358f3c67d0abc468b8349c
-
SHA1
ca3c9ca7ab17b1f7e6d5796449de7c90601b0a04
-
SHA256
d9c89e4f9100d4053cfc35f7c7fb9576fb4229e8049ce34cbec281f14a126621
-
SHA512
132507b4e0385d457ce2f16bae2e3ff8662d399b9df76053599bb747fc30c3240b1c52a0fa7b94cd40959fef69f7f62ba3e0dcaa459ef0b05a99b1e13c7cc9e0
-
SSDEEP
768:lY+1o93SK815S/FCOhpzJ9BRU/waOxjb3w+byp:lY+a93pO5KUOb/RUIaOpfW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
444749249e358f3c67d0abc468b8349c_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument
CGpoQSCZQDrTJrb
DbgADYpRpYqRobdY