Behavioral task
behavioral1
Sample
be65fb324dfb80920ff6d0328a7ef1c9_JaffaCakes118.doc
Resource
win7-20240704-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
be65fb324dfb80920ff6d0328a7ef1c9_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
be65fb324dfb80920ff6d0328a7ef1c9_JaffaCakes118
-
Size
77KB
-
MD5
be65fb324dfb80920ff6d0328a7ef1c9
-
SHA1
3d48f2dc24df87b6b38b04df5db4bc6c395fdb9b
-
SHA256
017e77854e4098851fe4a87b63ff2aec33a08fcb379c0f5ca1dcd3aea9a64aa2
-
SHA512
ca78c62197e947411ec95d05f53956d63a54f7edd6959441b4a99b841a1dc22cdba7677e9c94c1f4420db324bacb9280d61cce84fc6598a6948ac745f6a59d3b
-
SSDEEP
1536:WptJlmrJpmxlRw99NBz+aznAJD1R0PGrd:ate2dw99fbAJJRSGrd
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
be65fb324dfb80920ff6d0328a7ef1c9_JaffaCakes118.doc windows office2003
BXUnGdLZzc
zlnOGiEiRlJ