Behavioral task
behavioral1
Sample
fb499f840b3f89269875b51962593fac_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb499f840b3f89269875b51962593fac_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
fb499f840b3f89269875b51962593fac_JaffaCakes118
-
Size
85KB
-
MD5
fb499f840b3f89269875b51962593fac
-
SHA1
0fa8512eddd5e6a2b94a216c25486b55d26fbbdf
-
SHA256
e7435a841ee7686dec1e9d6f2b9d6cfe5f6f037e6697489f7093ae6f8d9b3037
-
SHA512
38cf3edbd88254c16ba58c9b38f7874b4ca32142759e2b4b27667f825480c94fe9d691bb483274b6fbae87a48662a2885812b78689645a820bd93b563f7c56cd
-
SSDEEP
1536:jptJlmrJpmxlRw99NBP+aEwCxaupItj8SWnQt:Nte2dw99fNupuj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fb499f840b3f89269875b51962593fac_JaffaCakes118.doc windows office2003
VzwjvKOjLzrTt
loVHrOkvhq
BJNpFwluNHIHM