Behavioral task
behavioral1
Sample
eaa02627e1853f20231e8214e58c6bee_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
eaa02627e1853f20231e8214e58c6bee_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
eaa02627e1853f20231e8214e58c6bee_JaffaCakes118
-
Size
89KB
-
MD5
eaa02627e1853f20231e8214e58c6bee
-
SHA1
5608b11de948c8905a4adb981f3f0ae05f45d7e4
-
SHA256
c3ec68965ad196eba7958a2969841d779caddbcb77f77caec406cd4cd707a184
-
SHA512
8199f2fae031d5580512c08b5a64ed3a6eda2e76fefc824ee9bb4e2ccb00a7c9ddd75f1835ed827a1a199d175001bbeb11f5afc3bd9d34192527dbdca8022bac
-
SSDEEP
1536:D2HSXjssocn1kp59gxBK85fBu+auyqpP63rv:D84241k/W48Ir
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
eaa02627e1853f20231e8214e58c6bee_JaffaCakes118.doc windows office2003
tzwFoUzJdmjSz