Behavioral task
behavioral1
Sample
08d2149d4e5949a4929d22ef6fd89cec_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
08d2149d4e5949a4929d22ef6fd89cec_JaffaCakes118.doc
Resource
win10v2004-20240419-en
8 signatures
150 seconds
General
-
Target
08d2149d4e5949a4929d22ef6fd89cec_JaffaCakes118
-
Size
163KB
-
MD5
08d2149d4e5949a4929d22ef6fd89cec
-
SHA1
7267c2cb7b6a9698e47bcf83a9b0ced1cafc6c99
-
SHA256
c497cff4385c5816d1b3fc3fe535695f020060037392e0eb5ba295e8fa5d0b10
-
SHA512
6e0a39478a6711baea77395767c8e9dbad75970fd85faacd25d3030ddfdfec619aab228db54ef8e58ed800e58228c0c5270257307e162288bef4c9ee87c7644b
-
SSDEEP
3072:HxjnB29gb8onFJ1vxkZy8f/xiHm8VAzy3X7:HxyMJbkZy8Xym8VAzy3X
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
08d2149d4e5949a4929d22ef6fd89cec_JaffaCakes118.doc windows office2003
wFpcccFKjw
OYDllmHzIvM