Behavioral task
behavioral1
Sample
4a6e2c97f1ea15cd21eb6e63c992489e_JaffaCakes118.doc
Resource
win7-20240215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a6e2c97f1ea15cd21eb6e63c992489e_JaffaCakes118.doc
Resource
win10v2004-20240426-en
7 signatures
150 seconds
General
-
Target
4a6e2c97f1ea15cd21eb6e63c992489e_JaffaCakes118
-
Size
152KB
-
MD5
4a6e2c97f1ea15cd21eb6e63c992489e
-
SHA1
5ca17ddc01ef7b5acb4a721058c772ab9f4084f0
-
SHA256
53a84cc8bb122beb814b36576b7144975b0a83d5b166fe42cd21a94dc280506b
-
SHA512
df797cbaff11d9c3e6e868b3793b0bfae78d573b673a69f0dccacac3187296ae30cab4c54a057dd0e7bec0d84b63b8a21abd2d1196ed4c3f0f30588938399ac0
-
SSDEEP
3072:Mc212Z/fse5LZz7ygcm1OcZLWODW4/Lbn5IDlAQk0/SL:Mc2UfHd/ygNMAuK6Kn
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4a6e2c97f1ea15cd21eb6e63c992489e_JaffaCakes118.doc windows office2003