Behavioral task
behavioral1
Sample
5e40ff4f7d71c5d7f15f3658f7f0f3e8_JaffaCakes118.doc
Resource
win7-20240704-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
5e40ff4f7d71c5d7f15f3658f7f0f3e8_JaffaCakes118.doc
Resource
win10v2004-20240704-en
10 signatures
150 seconds
General
-
Target
5e40ff4f7d71c5d7f15f3658f7f0f3e8_JaffaCakes118
-
Size
128KB
-
MD5
5e40ff4f7d71c5d7f15f3658f7f0f3e8
-
SHA1
dc0283bad8ea311041775a709f328099faa5ae91
-
SHA256
caf470ee82450f8c4735002e31f671acf1b6ee335658ef96117f2970645e0f40
-
SHA512
d037af5ce9126edfa99050b118636f9366cec5e334c78fde0f6ce88f976771fd288c1af3f53fedec44095b6dafe13ce146eb7ce53c5504365c4ec5b4bde98427
-
SSDEEP
1536:IHnYdmIa+w84pvAQUcTKB+KRUWie6Moq1QLhSr+gMY:IqmImpvXKwzWEsSLwrXMY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5e40ff4f7d71c5d7f15f3658f7f0f3e8_JaffaCakes118.doc windows office2003