Behavioral task
behavioral1
Sample
af6abe3561c428edbf227bd39fd70857_JaffaCakes118.doc
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
af6abe3561c428edbf227bd39fd70857_JaffaCakes118.doc
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
af6abe3561c428edbf227bd39fd70857_JaffaCakes118
-
Size
84KB
-
MD5
af6abe3561c428edbf227bd39fd70857
-
SHA1
bcfb0ca77f0ad8c5c9d52fef54901fd9d23c9444
-
SHA256
b9da3c2e9096f55fc8387617187315084ae4d584a385bc180b5a8e8713f181b3
-
SHA512
166f12ff68f2f403f5c41b5e0202495af53aa3ee4617afcf9cf690c9b7440b145178844bab5902b70e46d923f84a792b1b6a913692ac650f5f8845038a3d6279
-
SSDEEP
1536:jptJlmrJpmxlRw99NBw+a7T5Ss9zLGBX5A:Nte2dw99fK5RKR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
af6abe3561c428edbf227bd39fd70857_JaffaCakes118.doc windows office2003