Behavioral task
behavioral1
Sample
4ec24c38d01802b038ef5c87897e250b_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
4ec24c38d01802b038ef5c87897e250b_JaffaCakes118.doc
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
4ec24c38d01802b038ef5c87897e250b_JaffaCakes118
-
Size
73KB
-
MD5
4ec24c38d01802b038ef5c87897e250b
-
SHA1
279e266ea5e3aac629295adc1df96b64829d804f
-
SHA256
baf5644ed7bf7356615b8118cbec8b4754b3fbd1d69e2c067003d8b93d81d435
-
SHA512
1dffafa2652857dec312d1a72c37587416879dfdb4d1c765013e9d009094fb1232db7d1db88f162515dfaf19496a7b71e1b65f2406306c258c5dabf9a883bce8
-
SSDEEP
1536:IptJlmrJpmxlRw99NBv+aNhOVbeqIJNa:Qte2dw99fobl0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4ec24c38d01802b038ef5c87897e250b_JaffaCakes118.doc windows office2003
mOiOWtjlRGEqz
rbfTcfDzDtXK