Behavioral task
behavioral1
Sample
48bf628d054107a4d8b4fbb6397c8414_JaffaCakes118.doc
Resource
win7-20240215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
48bf628d054107a4d8b4fbb6397c8414_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
48bf628d054107a4d8b4fbb6397c8414_JaffaCakes118
-
Size
78KB
-
MD5
48bf628d054107a4d8b4fbb6397c8414
-
SHA1
e8d55807af9ff8b5bfe04ebf4361bb8f5def9654
-
SHA256
981b1d1b265f655957581a7756a552f3ef1fc0dbfb23040ae6d683bd4a538ad4
-
SHA512
fc3698e219987de7ff1a68fe6ae0bee1e90527441eb6b96e7ccf65a89399fc427a873c05fafd903336abec55a10acac4df5517db62e872c9ee1959c052cc29c7
-
SSDEEP
1536:TBueD+ZWauBbZEocn1kp59gxBK85fBi+aabhUgVXJDHk49R:ViZgB741k/W48fUYk2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
48bf628d054107a4d8b4fbb6397c8414_JaffaCakes118.doc windows office2003
DjZBwfQPcGK