Behavioral task
behavioral1
Sample
f53e5b89deb58b2b6a9543ba8aaa4f69_JaffaCakes118.doc
Resource
win7-20240704-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
f53e5b89deb58b2b6a9543ba8aaa4f69_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
f53e5b89deb58b2b6a9543ba8aaa4f69_JaffaCakes118
-
Size
253KB
-
MD5
f53e5b89deb58b2b6a9543ba8aaa4f69
-
SHA1
fad2a9210764a89f9524a2d62de8f76b64d012b3
-
SHA256
60149abf042392e352795c4bb2d731a75332e4bceb0daf83164baa0dcfa0dcd3
-
SHA512
07ab9f0d42320aacfa053dd72ad7b3abd3f831f5ec432f9e8d88bfee5ee29b639b0069d3df5196677b371ec2dc0a6e3c6d4bf8a522c33a815eed5c0f9642ac6c
-
SSDEEP
6144:wxL9nmlGyy7RBBKWZ4mIQRPagy/X2DdmE6:aIGRzBkYSg+2DdmE6
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f53e5b89deb58b2b6a9543ba8aaa4f69_JaffaCakes118.doc windows office2003
ThisDocument
Module0
activeness
Module1