Behavioral task
behavioral1
Sample
abcbb8d938cc8582cffe0aa4a1cc7f8a_JaffaCakes118.doc
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
abcbb8d938cc8582cffe0aa4a1cc7f8a_JaffaCakes118.doc
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
abcbb8d938cc8582cffe0aa4a1cc7f8a_JaffaCakes118
-
Size
573KB
-
MD5
abcbb8d938cc8582cffe0aa4a1cc7f8a
-
SHA1
5669c0d1b7931c1775a4b74c8d3c38a375da351b
-
SHA256
62f5258b885d6207bc8635147ae81437278a550e1a06838389e1978e4c99106d
-
SHA512
2b00385b3bf56cc37144c352a0168c859923ade5185f263f6415d0813494c8f5d8c1e93380b3133fa5f71c5dbc370d86be6465ed9b7f0f0f0be66716808c9da1
-
SSDEEP
12288:IuuH6/Z71ryDdt/5ZAxnDCopnQj36X5IVukbsGyyYXxr:Iu66/Z1g/0ROou2uay6
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
abcbb8d938cc8582cffe0aa4a1cc7f8a_JaffaCakes118.doc windows office2003
ThisDocument
xCLhaz
UserForm1