Behavioral task
behavioral1
Sample
emotet_119.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
emotet_119.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
4cd62a71d2e8843a00565f2e170a07d9_JaffaCakes118
-
Size
89KB
-
MD5
4cd62a71d2e8843a00565f2e170a07d9
-
SHA1
f46bfa326825e9a964e33db2bd7f0065007d7312
-
SHA256
acb909d98eb7a643cbc863854e0bed43a1da6082859d4015621125cdf06b8c7e
-
SHA512
85f8c1f2d9092eee3192ba54063d20a41e988394e645cf4deb540ad91bef52296997d4024ec00f61c90bc72022aede066904a94690d5b4f615d455d6005b9cb3
-
SSDEEP
1536:61m9qEA+vudU6kyD83ArLCKYrywwymR8ABJsNK5EBzBOUsOAKQwtsiHDOXo7A:614qE5vu5QiLC9WwOKM+K5UBOtwtJDO/
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/emotet_119.doc office_macro_on_action -
resource static1/unpack001/emotet_119.doc
Files
-
4cd62a71d2e8843a00565f2e170a07d9_JaffaCakes118.zip
Password: infected
-
emotet_119.doc.doc windows office2003
ThisDocument
IDsWYfdHPbMnD
juMIzHlctqAO
aaKtritGBEA