Behavioral task
behavioral1
Sample
72abbface4c8cea179df95e9717cfde4_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
72abbface4c8cea179df95e9717cfde4_JaffaCakes118.doc
Resource
win10v2004-20240426-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
72abbface4c8cea179df95e9717cfde4_JaffaCakes118
-
Size
203KB
-
MD5
72abbface4c8cea179df95e9717cfde4
-
SHA1
c358ec289edd6febf28edd2c518ba43055c78086
-
SHA256
f349dcd66a084e8b9b503b274d9128d22931497b78675b8e8ab424977db22275
-
SHA512
653bd8f5e4c9d57b39545a7372f3273dbf573ce064ed4c450628f53402738cade128fafc0f8c79f011072edf9e20f9da9bbf3271f42b977ebc129bb3229f86f0
-
SSDEEP
3072:Xte2dw99fk3vIAWHWaaYuK5vE0B8FlgN2zU/Li0LZ:9Hdw7kwAWHWFK5TBmlgNfLFZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
72abbface4c8cea179df95e9717cfde4_JaffaCakes118.doc windows office2003
XvbVAwkLBJJKi
kaZatch
DMpqslLvkC