Behavioral task
behavioral1
Sample
a3f7be18f0a58ad5b0aa871f4c99a0bf_JaffaCakes118.doc
Resource
win7-20231129-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3f7be18f0a58ad5b0aa871f4c99a0bf_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
a3f7be18f0a58ad5b0aa871f4c99a0bf_JaffaCakes118
-
Size
111KB
-
MD5
a3f7be18f0a58ad5b0aa871f4c99a0bf
-
SHA1
043541f84cea61b57a3d44c1dfaf7d439497acab
-
SHA256
c57849c558aacd8341b0ac0e41f02ddd5631942137e982dd2d182b4ccaa7dfc6
-
SHA512
e342735c7afb1c18982e97125328f59efa34d11a1a8976cee099ec48be10897c208f6aa7e552868ba8e07cf422d3eb7027692095a1da0ab1b560cd9057af9540
-
SSDEEP
1536:+TxjwKZ09cB7y9ghN8+mQ90MTm+axCZ+ECnr6GrZ:GxjnB29gb8onxZ+9nRr
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a3f7be18f0a58ad5b0aa871f4c99a0bf_JaffaCakes118.doc windows office2003
jKoJTiHJWESm
bbEwSbp