Behavioral task
behavioral1
Sample
fc1997ded3c1d491cc0d6ac7ea5a6a6a_JaffaCakes118.doc
Resource
win7-20240708-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
fc1997ded3c1d491cc0d6ac7ea5a6a6a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
fc1997ded3c1d491cc0d6ac7ea5a6a6a_JaffaCakes118
-
Size
80KB
-
MD5
fc1997ded3c1d491cc0d6ac7ea5a6a6a
-
SHA1
bd3844212b042435f98d8bc12e536ed07d8405be
-
SHA256
e49ea69656bd0d4e6a13b467e6ca4be7addd52bed6dcd6709cd812da6f130bdc
-
SHA512
28fc8e2d4d64e66dbf1448d96c719f3cca49ea6e181289dff92ccb0e79f04077c0d09878561f72a510a91b1af82b2005b8f6f58fd38d05ebbddbfd093e548885
-
SSDEEP
1536:sptJlmrJpmxlRw99NB2+as19D6BPshcFGNTg7Eqp+0:ste2dw99fPzV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fc1997ded3c1d491cc0d6ac7ea5a6a6a_JaffaCakes118.doc windows office2003
LOVSLHAjB
jCnjtXZjcMYF
adnDjBfuUuaOq