Behavioral task
behavioral1
Sample
5076c1f719f8579daeef8a9c6c20a391_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
5076c1f719f8579daeef8a9c6c20a391_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
5076c1f719f8579daeef8a9c6c20a391_JaffaCakes118
-
Size
114KB
-
MD5
5076c1f719f8579daeef8a9c6c20a391
-
SHA1
a494ca82011e12a9fa8b6cf5f6e63cbc9729483b
-
SHA256
2e650a98d1ec0c382a023e11ccb06d0b82624ab1549c5cf38d0e786e454f1d9b
-
SHA512
895df25fe9faee365273f8c535104f6ede7f64fd49c923d400c4e66dcbde54e930ad00b9c9f8d5850ab93fbd8b1b0e2c43cb08f3863431b9ef5c641bf4a02817
-
SSDEEP
1536:NptJlmrJpmxlRw99NB8+aXvV4UEXU0zqF1voveYhnpC:Tte2dw99fA5IzqFyew
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5076c1f719f8579daeef8a9c6c20a391_JaffaCakes118.doc windows office2003
nHawNUvzilwUu
YvMwozGoSVhPO
swKwGVoAV