Behavioral task
behavioral1
Sample
935b07a6f2a00b8ca625ef04a73896951908d7be53a376a42f735834ce9e5051.doc
Resource
win7-20241010-en
windows7-x64
12 signatures
150 seconds
General
-
Target
JaffaCakes118_bf0e96518ed963661f2390fbca0abd06fa85df03c38f1ba6e493032055eee0e0
-
Size
408KB
-
MD5
af328b6486d59d891caed8cc7a073f2a
-
SHA1
ecb09074c7f553c428fc807471a841e8ef3ca830
-
SHA256
bf0e96518ed963661f2390fbca0abd06fa85df03c38f1ba6e493032055eee0e0
-
SHA512
340ee6ce0c9a8ea190c0324c7637f72db62c0d50d498ed3a46ede5dc62d320aa1e540db3582328f419a2ea3e3e9bb7f51b6325a4893f91fe7fa5c0bb8d43a6ee
-
SSDEEP
12288:UL+behUCgaTjfeCK4HXAsperd0qbgRmwL75vT4L4:Uq+UcaCK4HXDehx01v5vTi4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/935b07a6f2a00b8ca625ef04a73896951908d7be53a376a42f735834ce9e5051 office_macro_on_action -
resource static1/unpack001/935b07a6f2a00b8ca625ef04a73896951908d7be53a376a42f735834ce9e5051
Files
-
JaffaCakes118_bf0e96518ed963661f2390fbca0abd06fa85df03c38f1ba6e493032055eee0e0.zip
Password: infected
-
935b07a6f2a00b8ca625ef04a73896951908d7be53a376a42f735834ce9e5051.doc windows office2003
ThisDocument
BetweenArrays