Behavioral task
behavioral1
Sample
5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc
Resource
win7-20240508-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
5f73269a632986304114e57d3eb98b53_JaffaCakes118
-
Size
109KB
-
MD5
5f73269a632986304114e57d3eb98b53
-
SHA1
fb222d6c7b0f99612d5da76e0e0479b5d196590e
-
SHA256
02c97c7cfa6fa18281256b83b09b0457d667c095c64bdcdab009cefaeed524a5
-
SHA512
98158dbb354ecb5a3d17c298f1d5a1d62ac26d252090a78a17c2c95bb58e63e1cd2746a6a95e79b3b5522a6dde74018d04e58c13b86b94fc7cd2b85082527e6d
-
SSDEEP
1536:3FFFF7dC7MQMXc0qg4F5MnrA+aJks0abqExYBvAy42+Ge:XQ5g4fYXZAyh
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc windows office2003
QdITzZNNNA
rZtivMUjWOuUm
bpGfElNOnwbjZi