Behavioral task
behavioral1
Sample
0cad4f9b6f9315f45279842170dc81a2_JaffaCakes118.doc
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cad4f9b6f9315f45279842170dc81a2_JaffaCakes118.doc
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
0cad4f9b6f9315f45279842170dc81a2_JaffaCakes118
-
Size
171KB
-
MD5
0cad4f9b6f9315f45279842170dc81a2
-
SHA1
9410fee3c43114b10866d65c16ec1fd78d64cd0a
-
SHA256
3031dedde587c9007b577148119235a656ae42e105b3ecc882a496910da7bd1d
-
SHA512
143a0073edd4928f009817552f871618253ffc24f41c8a79db8255ed243dfa4dda107b3622881794c44c3a059ce9091baa922e8604faceaf931e57ae38d0380a
-
SSDEEP
3072:UwxReigEygjQLi0m/t+D3QZzqE9I3WnBqOn8fy3:UwxwRYjFkLGn9I3WIy8q
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0cad4f9b6f9315f45279842170dc81a2_JaffaCakes118.doc windows office2003
ThisDocument