Behavioral task
behavioral1
Sample
005338dfcae6618e8ac3464dd252bb11_JaffaCakes118.doc
Resource
win7-20240729-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
005338dfcae6618e8ac3464dd252bb11_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
005338dfcae6618e8ac3464dd252bb11_JaffaCakes118
-
Size
61KB
-
MD5
005338dfcae6618e8ac3464dd252bb11
-
SHA1
46e4b59857aa332dc1c63a16879dd8e5bfd1d1a9
-
SHA256
5246a394e17900bd91bc81c3046d4d1c21505a403a9713b69c0aaa1fef917790
-
SHA512
756c6cc0f91d20fbbfefde4426a0ed31553ecde0a67bdd4df5ca99c6435ee24359de611e230565b37857f70980d44914850788c3863d6d9f620e3e6b72b41747
-
SSDEEP
768:xoqQx24pRsPMhsS9DWhqixw+d5hYe5wAPoQUSJrWG6/Bp:SqQx6usS9aJxwAvwAPotqr
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
005338dfcae6618e8ac3464dd252bb11_JaffaCakes118.doc .vbs windows office2003 polyglot