Behavioral task
behavioral1
Sample
09bfd7223acae383b7e149a1840af3f8_JaffaCakes118.doc
Resource
win7-20240419-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
09bfd7223acae383b7e149a1840af3f8_JaffaCakes118.doc
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
09bfd7223acae383b7e149a1840af3f8_JaffaCakes118
-
Size
14KB
-
MD5
09bfd7223acae383b7e149a1840af3f8
-
SHA1
4ff26a8216897ec64b7596788a30daf23245b372
-
SHA256
29833bc30d7e7b954a637ac750a56199b07af5ad323cebc7ac83a9f22a66020f
-
SHA512
b8a955506af420a8aa1f6b4dab47a75a84be3acbc0e73ec4fa220991f9a5e84f1dfd9ac38ca51f16ef1f1fba8496895df09402ee32ce26cb293de8898166112f
-
SSDEEP
384:VMcAv9/P0j9UL7vnxi8x+p8FYvMpbpt8/F:el3SUXJL+p8F2MG
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
09bfd7223acae383b7e149a1840af3f8_JaffaCakes118.doc windows office2003
ThisDocument
Module1