Behavioral task
behavioral1
Sample
991f322872d63474035d0a3c3c927e5e_JaffaCakes118.doc
Resource
win7-20240419-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
991f322872d63474035d0a3c3c927e5e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
991f322872d63474035d0a3c3c927e5e_JaffaCakes118
-
Size
268KB
-
MD5
991f322872d63474035d0a3c3c927e5e
-
SHA1
f3c175b745ced1f8f7738531c08a082524d67c6e
-
SHA256
3e55511853b7d5cdee99880a8aeb517b2f49c887b3771348b71ee7c33a409fe9
-
SHA512
b0218a529c30d17912ad7a26e2e063cbc1f29f250e5837ae6e2bdd4841e0e1c1c9f42f9416a596066bff80847d324ab7bebe57a08b807058c3ffef58e498bf0c
-
SSDEEP
6144:cCwQK3RpVS7G4SVuz1QzLhxztsZGPwtM:eQQLGSVuz1QHhxztCtM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
991f322872d63474035d0a3c3c927e5e_JaffaCakes118.doc windows office2003
ThisDocument
GXbkFnp
PFUGY
Hx2KATO
f