Behavioral task
behavioral1
Sample
0c1caa39cee91e2b1863b3f456faf6bc_JaffaCakes118.doc
Resource
win7-20240419-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c1caa39cee91e2b1863b3f456faf6bc_JaffaCakes118.doc
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
0c1caa39cee91e2b1863b3f456faf6bc_JaffaCakes118
-
Size
23KB
-
MD5
0c1caa39cee91e2b1863b3f456faf6bc
-
SHA1
45467b68bb31e2719c1e3817ef9e5601a805bb1c
-
SHA256
bcfa8d89694d3913980edd00a8434476f007af85db4142c6ba50a559e6146f7b
-
SHA512
5a9825c228bd26afbd068dad74281c08f0b8849da2c73dc995e91ec8708abb27592dfedb866158d4292b89d3c77be83736256c05bc2999175a9bff4e148269ef
-
SSDEEP
384:NwVld51wa4VldQAXkQ/l5wRfQwG36lt6cGc:ANHk3XwG36lt6cGc
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0c1caa39cee91e2b1863b3f456faf6bc_JaffaCakes118.doc windows office2003
ThisWorkbook
Sheet1
Chart1