Behavioral task
behavioral1
Sample
c27c4a3e036dd49004b18ec0b2ebdbef_JaffaCakes118.doc
Resource
win7-20240705-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
c27c4a3e036dd49004b18ec0b2ebdbef_JaffaCakes118.doc
Resource
win10v2004-20240802-en
11 signatures
150 seconds
General
-
Target
c27c4a3e036dd49004b18ec0b2ebdbef_JaffaCakes118
-
Size
98KB
-
MD5
c27c4a3e036dd49004b18ec0b2ebdbef
-
SHA1
9790c3217336098b0273818256767423ee3d54ff
-
SHA256
afc7144b0a9b76e39cae60513beda1162255d5084514d142d011f36f7a807218
-
SHA512
12e216f3a8e233f17783090c136410b358b4f5951652e433a582e3b4af78c11f23a45264ae94f3122de4a6aefb0bb84e1606eb400cc6d2207262158c3d0800c6
-
SSDEEP
1536:+TxjwKZ09cB7y9ghN8+mQ90MTr+aOy4n2NgbspWKW:GxjnB29gb8oni3As+JW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c27c4a3e036dd49004b18ec0b2ebdbef_JaffaCakes118.doc windows office2003
HQzCCfZMamVFSH
nNiWjTCZoGGkEj