Behavioral task
behavioral1
Sample
5ad186d503a5ce6db2c8ef5e13723154_JaffaCakes118.doc
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ad186d503a5ce6db2c8ef5e13723154_JaffaCakes118.doc
Resource
win10v2004-20240709-en
11 signatures
150 seconds
General
-
Target
5ad186d503a5ce6db2c8ef5e13723154_JaffaCakes118
-
Size
48KB
-
MD5
5ad186d503a5ce6db2c8ef5e13723154
-
SHA1
eb4f02a39685b8833c8891734aedcbaecbf3206a
-
SHA256
d94bdfde052dec8566287a70a7d43090870654dc7bb9004c8d69be61e39862c1
-
SHA512
03cffcfc62fdfaab81eda3c887cf5ce354cfcec5f7d76d484782dd47f03bccb8a69f43e1246da1f3842dcb1abb6b33668b262961d46374f0c199e6c29de72939
-
SSDEEP
384:z+0iSbReydPftdnSk4te2jbRtM2G/QZnZNQ8DE60jN:bZ5VybRa2GKndq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5ad186d503a5ce6db2c8ef5e13723154_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument