Behavioral task
behavioral1
Sample
0cd2dc8f5077f4bbf3b937793970fa25_JaffaCakes118.doc
Resource
win7-20240215-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cd2dc8f5077f4bbf3b937793970fa25_JaffaCakes118.doc
Resource
win10v2004-20240226-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
0cd2dc8f5077f4bbf3b937793970fa25_JaffaCakes118
-
Size
76KB
-
MD5
0cd2dc8f5077f4bbf3b937793970fa25
-
SHA1
cd23e7cf92c31d0d61b717e3aa520f696e3a031d
-
SHA256
0ee992c47ce36bb0ec5f69e73c1503daac08270193ffa3a8bfbcd9efccd903c5
-
SHA512
cca2600b1dcc91903695d49d8914581604e15c18e043dbd95a3573593cae8412aa41fdb5d7e739f0de73d1cd3e59b80e8bdc0f6f0a158bb2786199d185212586
-
SSDEEP
1536:zptJlmrJpmxlRw99NBF+a//zUmUmUlo/gGbc2+:9te2dw99fluNQc
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0cd2dc8f5077f4bbf3b937793970fa25_JaffaCakes118.doc windows office2003
iwfCjJUwfjJCf
szvwrqz