Behavioral task
behavioral1
Sample
6ef8d003dd1941e40dff8fe6c31a9491_JaffaCakes118.doc
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6ef8d003dd1941e40dff8fe6c31a9491_JaffaCakes118.doc
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
6ef8d003dd1941e40dff8fe6c31a9491_JaffaCakes118
-
Size
24KB
-
MD5
6ef8d003dd1941e40dff8fe6c31a9491
-
SHA1
74e18a155df4817498a7fb3f90f063a05014d17e
-
SHA256
ab7df9fc979ac46c8f4c7d83740189ab645d1d27ec38b395f91f1e610c8bdf8c
-
SHA512
644f59ca47e5d1d5b728af700c4043a27faac9eeb4e831964d22b38940c03163af14c5dfb2527855eb6fd21f01ddf6ea46314e7f75dfa2540b9c7f7c19a163c6
-
SSDEEP
384:M7By7CfdqJd65Zc4yxoE0j6GRtEDGKorO9Ku+:TWf4JdYUhfG7++
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6ef8d003dd1941e40dff8fe6c31a9491_JaffaCakes118.doc .ps1 windows office2003 polyglot
ThisDocument
iyMDCExop
wXBez
UY0Cjd
fm