Behavioral task
behavioral1
Sample
4b5ed4f2edb62459489fafa33f4d69ad_JaffaCakes118.doc
Resource
win7-20240419-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b5ed4f2edb62459489fafa33f4d69ad_JaffaCakes118.doc
Resource
win10v2004-20240226-en
8 signatures
150 seconds
General
-
Target
4b5ed4f2edb62459489fafa33f4d69ad_JaffaCakes118
-
Size
151KB
-
MD5
4b5ed4f2edb62459489fafa33f4d69ad
-
SHA1
95165579f12c037fe51c1917c02e589ce94b1059
-
SHA256
c951c7117cf04d496105bcf5b06c6e8a9fdc3498c8e57543ba0a289d5b38b21c
-
SHA512
6812c83915b34a0ef5ecb6d3114c3c72606e54ded5342b7757189405c14bf8e3a9fe4889773649fa55e5281e0e0842397c1c56ef75cf49eec35d7ab206998099
-
SSDEEP
3072:B0e8cKUwag2Dgue9fLwfMbIu4Dhu6FO1gUdSH:B00ha2DBe1sfMku8hzFm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4b5ed4f2edb62459489fafa33f4d69ad_JaffaCakes118.doc windows office2003
ThisDocument
jXoSRckdShz
RkDXFppTSm
OzWuIKv
aiMhAIzi