Behavioral task
behavioral1
Sample
4bf29800f489501d6bf0a6cf663835cd_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
4bf29800f489501d6bf0a6cf663835cd_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
4bf29800f489501d6bf0a6cf663835cd_JaffaCakes118
-
Size
126KB
-
MD5
4bf29800f489501d6bf0a6cf663835cd
-
SHA1
28358d48c0cda4920db6eca2237c78ee92bb9ee6
-
SHA256
1c4aa8f85cddd0abed11783096da8a92b79293962d51afee8feda3ba498795f2
-
SHA512
9867cd35f2aeab98df97818c913e0af3e94a5560df62d6f57bc7f189808b4e4b87399ee9f7f617c1df0d634544d3c842f4b518e8fe7aa007f95d665f2ef76a43
-
SSDEEP
3072:GP/2tnN6ECJQ3+FMT6BIPW9ELSqbUd1QfGX:GP/2hG
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4bf29800f489501d6bf0a6cf663835cd_JaffaCakes118.doc windows office2003
ThisDocument