Behavioral task
behavioral1
Sample
052265e97c938c0aeed81f6ab0ac9b22_JaffaCakes118.doc
Resource
win7-20240903-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
052265e97c938c0aeed81f6ab0ac9b22_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
052265e97c938c0aeed81f6ab0ac9b22_JaffaCakes118
-
Size
60KB
-
MD5
052265e97c938c0aeed81f6ab0ac9b22
-
SHA1
b4bc6c166ea8db638ce7da1c72b380ea211fe83c
-
SHA256
fa99b3354f329988944d1948574b03076d80ecc8f78757f901f851118cc2170e
-
SHA512
ee66bb5dcf93cd3b935d1e9916c2e983f4676d498f55d7f69e00ec7d385e9b78ef2e5a984e05c1c62e6969102ef17132fd02e0f87d8758e6e8816bc156422578
-
SSDEEP
768:kOuIrAPotU4wTRIxDYl6aXkvP2Gsy139QDcry4pL:kqrAPotUfI906CkvP2E3F
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
052265e97c938c0aeed81f6ab0ac9b22_JaffaCakes118.doc .vbs windows office2003 polyglot