Behavioral task
behavioral1
Sample
EMSB.doc
Resource
win7-20240508-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
EMSB.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
6062b7432c215bd291fdeba06eea9d15_JaffaCakes118
-
Size
64KB
-
MD5
6062b7432c215bd291fdeba06eea9d15
-
SHA1
95458d5085dd2fc423eac71720f75067f2a3b272
-
SHA256
74d716a1dcda451eb7bc71a742631ef63451d62fd9aa7a6383537f3b766584ce
-
SHA512
af055b1518d549853046b6d7c82216809118d75fe8dbda06b09975ca299dad588998988cf130a3f83dc2ef08dd718ab5ff63960e31c007c84c8207f373337195
-
SSDEEP
1536:mKbZKYJU33uCnjGFHTOFrByUvhLjrIe6c1/wGCSSDxSDz:mKVPg86FrBl5v0edYGRt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/EMSB.doc office_macro_on_action -
resource static1/unpack001/EMSB.doc
Files
-
6062b7432c215bd291fdeba06eea9d15_JaffaCakes118.zip
Password: infected
-
EMSB.doc.doc windows office2003
ThisDocument