Behavioral task
behavioral1
Sample
7f2502c1912d7b3b5fc9e1bc8c5688d2_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f2502c1912d7b3b5fc9e1bc8c5688d2_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
7f2502c1912d7b3b5fc9e1bc8c5688d2_JaffaCakes118
-
Size
35KB
-
MD5
7f2502c1912d7b3b5fc9e1bc8c5688d2
-
SHA1
75b762f059f634f7e454bfcc0788184bce8bee95
-
SHA256
44ccb088ea54b0dde11b082e140fc73f0ac78782c67da8088655e3a08fc349a2
-
SHA512
6b51d4d7a452bcbd55004cbcfa9d9b0dc75389c87a75f1519c9a8ca0562a67beec744c08def78618d5b766c72f04974d9affe30fab39c928d7da6187e10e7985
-
SSDEEP
384:W0iSbOMKKHK1OM5Gf/Sc2WYNesHe1jmaDCvjN0j4VpYtXd:JKKq13lemazCv5H
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7f2502c1912d7b3b5fc9e1bc8c5688d2_JaffaCakes118.doc .vbs windows office2003 polyglot