Behavioral task
behavioral1
Sample
60360691a3bc70f784b9808e5f588932_JaffaCakes118.doc
Resource
win7-20231129-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
60360691a3bc70f784b9808e5f588932_JaffaCakes118.doc
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
60360691a3bc70f784b9808e5f588932_JaffaCakes118
-
Size
84KB
-
MD5
60360691a3bc70f784b9808e5f588932
-
SHA1
aa5751a3aae4823c538bab6ba5e7644d37644d96
-
SHA256
40029e84ba87ee6eea117098d608db25f571b5468bb5ed096b5b669bb7cf1ae0
-
SHA512
e783b03d3b69a3cf95ef2c9dd298ed2ceb09558d773590a0a63702f74e56fda8683c4dd3b1c72819649e778b37c28362996fef322cbc383ec60e98cdffecbb24
-
SSDEEP
1536:LptJlmrJpmxlRw99NB5+aWhG3ovbO4pTi1ocsUQ:Fte2dw99f4KobmacpQ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
60360691a3bc70f784b9808e5f588932_JaffaCakes118.doc windows office2003
vKSKEZoqA
jwLKAtJJfKECO
mjJnMDvdPiNtZQ