Behavioral task
behavioral1
Sample
dbd2b86c7533b2f70feb439664eb266e_JaffaCakes118.doc
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
dbd2b86c7533b2f70feb439664eb266e_JaffaCakes118.doc
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
dbd2b86c7533b2f70feb439664eb266e_JaffaCakes118
-
Size
149KB
-
MD5
dbd2b86c7533b2f70feb439664eb266e
-
SHA1
1109de3e62374be0c1f5a78bebfffe41918bb44a
-
SHA256
8273dac0332cd80b9d834b63118d5e171eea1d12b81c1bb2fa43a423ab173ca1
-
SHA512
0c9f541377a382c9a0b61a57d9dd0a9c2bd34bf338cd3996c8dc7c605a64d5e72880e2542d309ee6cdb750a07f1c341f8c4adf9f146634adb4c88a1ae86fa23a
-
SSDEEP
3072:dIKVe7D9YD98IiikHyNjWuDlr8eGS16D:Be7CD9riikHyNjbDlrbLU
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dbd2b86c7533b2f70feb439664eb266e_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros