Behavioral task
behavioral1
Sample
c026065d562a240238d656b54bbdda77_JaffaCakes118.doc
Resource
win7-20240708-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
c026065d562a240238d656b54bbdda77_JaffaCakes118.doc
Resource
win10v2004-20240802-en
11 signatures
150 seconds
General
-
Target
c026065d562a240238d656b54bbdda77_JaffaCakes118
-
Size
131KB
-
MD5
c026065d562a240238d656b54bbdda77
-
SHA1
c40f240de19e5306f438b3549f6e67fc7e29b319
-
SHA256
33c804fd01b23e7d8b011874183412572787fe54dd5fba3bc8f1db19ef211cb1
-
SHA512
0231c45e8ed4daf9b40d66a196629b0eb1e32f65005d2d7f8db64de002aa2eacc8c2d9042597edfc295148eefaba2cb5684672f28d255cb8144a6306ca70b958
-
SSDEEP
1536:JpptJlmrJpmxlRw99NBg+axchJ3xNtNLZf1/HuCZ9PzDO+:Fte2dw99fTBRH5dq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c026065d562a240238d656b54bbdda77_JaffaCakes118.doc windows office2003
ladCsNEzQZrN
QfiqSlRj
GtipKscS