Behavioral task
behavioral1
Sample
6319ead80cd82034068a46661502d43b_JaffaCakes118.doc
Resource
win7-20240215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
6319ead80cd82034068a46661502d43b_JaffaCakes118.doc
Resource
win10v2004-20240426-en
9 signatures
150 seconds
General
-
Target
6319ead80cd82034068a46661502d43b_JaffaCakes118
-
Size
165KB
-
MD5
6319ead80cd82034068a46661502d43b
-
SHA1
0bbdbcd04f008a7414fd0aeeee851f637dbc7388
-
SHA256
4c18105194296546d95c34b35ebfb1447c31d838f8ef957143ed25e40ddb5d83
-
SHA512
e0454dd31a2e6749d653ee0c20d17113a81e878f96595e30600d7477cffed5fac4215160441ebf7b53739251c7333fcf052e8b2209b3b69fc219a921ede8e1fd
-
SSDEEP
3072:zte2dw99fDZzdaTTOoaQNff6OW4PBOEM2bvDhXpV6u:BHdw7WTCoaQNJOabv9XpV6u
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6319ead80cd82034068a46661502d43b_JaffaCakes118.doc windows office2003
CPVAjEz
TGhITJJlJLvnMh
zswjGGY