Behavioral task
behavioral1
Sample
e0e8dc61e599e2d75fd46abd67015ab3_JaffaCakes118.doc
Resource
win7-20240903-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
e0e8dc61e599e2d75fd46abd67015ab3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
9 signatures
150 seconds
General
-
Target
e0e8dc61e599e2d75fd46abd67015ab3_JaffaCakes118
-
Size
227KB
-
MD5
e0e8dc61e599e2d75fd46abd67015ab3
-
SHA1
ca2c35f78e9624476f5e03882e1b5a660341ff4a
-
SHA256
70a1a97908fa7e9633fd4558b5625082f45288822f419cbef7c9bcd15b7b238f
-
SHA512
f26d7690f1162ce375e173cd351064b52c0d6d832758cb9ff7f66dd79c64073439760629968599679e4f3f7bed97c0ec3b2011120e54c47dbfc73ac7b009092e
-
SSDEEP
6144:wFVeEsjdXRC3jexGG6VYWofd+kBvFJB7:wFVeEwdXET088d+kdFJB7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e0e8dc61e599e2d75fd46abd67015ab3_JaffaCakes118.doc windows office2003
zzwVdzoECzRE
MsZHQCWLA
jqjwBkzFO