Behavioral task
behavioral1
Sample
f710ec21ce1465235c69bf12a918d285_JaffaCakes118.doc
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f710ec21ce1465235c69bf12a918d285_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
f710ec21ce1465235c69bf12a918d285_JaffaCakes118
-
Size
31KB
-
MD5
f710ec21ce1465235c69bf12a918d285
-
SHA1
4d5773ab99357e32824051e8c7c75d8e6790f70b
-
SHA256
53074664c40b3bc73af4082bd0376bac5668c551820c7704569ab8d7ed024f3a
-
SHA512
22c53cdcaf7ba98c64e58b7a85708df1274e6a69e34573a333376b26d9129d2c635f015c57cc7e2f38a9c663d9a971900d31261a4d33081135f943c6b0204aa3
-
SSDEEP
768:UV0ASa41TU1hjZU0YbQzWxKaema1x3+u2p:UqUTBHtaema1l+u2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f710ec21ce1465235c69bf12a918d285_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument
frm
ao3ubn
a0GZ9F