Behavioral task
behavioral1
Sample
051c4dc469a96edbbca0a7382dbc1ed2_JaffaCakes118.doc
Resource
win7-20240708-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
051c4dc469a96edbbca0a7382dbc1ed2_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
051c4dc469a96edbbca0a7382dbc1ed2_JaffaCakes118
-
Size
64KB
-
MD5
051c4dc469a96edbbca0a7382dbc1ed2
-
SHA1
ce5ea662e764594020c6708b9517b9417ab9b7e3
-
SHA256
915e485ae91b49e8a1086412496fbabab73fac54aa661f0812697445566a5285
-
SHA512
3ad2445376ae9095d52092febf00e65f7644a6622feb05cf6c0cd919ef0ae65cf8ddbc940117212efc5ea85e93d1fe59465f7d8461325436095f6a560cbd4582
-
SSDEEP
768:ePTkmR3neyfRaetvsDv43MqdhaIrHPXD4xz996YXT7:Mka3nrRXvsDQ8qdha4/D43
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
051c4dc469a96edbbca0a7382dbc1ed2_JaffaCakes118.doc .vbs windows office2003 polyglot