Behavioral task
behavioral1
Sample
51591a026b0962572605da4f8ecc7b1f_JaffaCakes118.doc
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
51591a026b0962572605da4f8ecc7b1f_JaffaCakes118.doc
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
51591a026b0962572605da4f8ecc7b1f_JaffaCakes118
-
Size
167KB
-
MD5
51591a026b0962572605da4f8ecc7b1f
-
SHA1
437dd690887d1dd78ed3835a06995c2b396183ed
-
SHA256
a92bdef34e5fe2d6106a837bf166cba220b126c7643a7f7a58653cdc8d918b1e
-
SHA512
0ec0ca263b9489c07af17fe0876c71a3d28cfbffb1776bc529fcb00934a1c734a5ca898be89bc601c62adef2c13d14923ecea0d07b160213679b4c4d299356a5
-
SSDEEP
3072:DtsNQwMsNJDCsld0de8wKObQTrhhC+6B+V97F:DtsFMsNJDplidH5TFA+Vj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
51591a026b0962572605da4f8ecc7b1f_JaffaCakes118.doc .eml office polyglot
ThisDocument
Módulo1