Behavioral task
behavioral1
Sample
0cc7d03ca103a48497b134c201cb2900_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cc7d03ca103a48497b134c201cb2900_JaffaCakes118.doc
Resource
win10v2004-20240419-en
10 signatures
150 seconds
General
-
Target
0cc7d03ca103a48497b134c201cb2900_JaffaCakes118
-
Size
78KB
-
MD5
0cc7d03ca103a48497b134c201cb2900
-
SHA1
78b2a252283adeb180a38985a293ce15a764bed1
-
SHA256
745d9941a7ac2aa275e81dbcbdf4288cc6a04f9e480318ad3c43cad77131473e
-
SHA512
0b6f8afc825d5ebf3ed928fdb5927306068adc0554cfea0aec1c4f6f6e986acd4190aeac9a38970ae0213e9687db71b8c918eed6c8d2f3c74122e83d685a55c2
-
SSDEEP
1536:SptJlmrJpmxlRw99NBk+aHsU4rTDUdUNAMeWT:Ote2dw99fg4r3UdqAMe
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0cc7d03ca103a48497b134c201cb2900_JaffaCakes118.doc windows office2003
EaQtQvZi
GjWCjJazapR
umJJFLVjtf