Behavioral task
behavioral1
Sample
085b26396dc62a72ded5d4d286ef79a1_JaffaCakes118.doc
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
085b26396dc62a72ded5d4d286ef79a1_JaffaCakes118.doc
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
085b26396dc62a72ded5d4d286ef79a1_JaffaCakes118
-
Size
60KB
-
MD5
085b26396dc62a72ded5d4d286ef79a1
-
SHA1
b7d054ad84367055224c9ebd629e5521e50301cf
-
SHA256
dffcd5896599ea6c8af4cc260ec667ed9f73a30e7a1800673421e8b60a5d0554
-
SHA512
9fbaf584e665630de2b3c1fec1dbbf27e16c97d6373074b9c5b66af51a1b0f2898339ee745d218f1ef5f0c2dc64821f280d69528bc1f1cc953926587e3951dd2
-
SSDEEP
768:U7ZrkuhCiI3FlSNIAkp/qidyZci4TtiyVMC5IZSx2SA:UF4uhrI1FqicKASx2SA
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
085b26396dc62a72ded5d4d286ef79a1_JaffaCakes118.doc windows office2003
VtvPtzpL