Behavioral task
behavioral1
Sample
0df31c64d84fc8204217bdc9d6b6e956_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
0df31c64d84fc8204217bdc9d6b6e956_JaffaCakes118.doc
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
0df31c64d84fc8204217bdc9d6b6e956_JaffaCakes118
-
Size
78KB
-
MD5
0df31c64d84fc8204217bdc9d6b6e956
-
SHA1
1997adef38bd6ad01a54b5ba45dee4c01b3a9450
-
SHA256
b9ed9d7fcf8e4a7801770e0e6ddc1ebc5b99956cc698f79afed57069dc88be16
-
SHA512
96b5ce863d09b860085b719094b9b47653c26fac6bcdb2d1fe84feb28dd538b9868249e2c9043898abc127b0c5adc955b88f3a43810e53fd9c572e83431b5601
-
SSDEEP
1536:tptJlmrJpmxlRw99NBf+aHENy134L/Ojsn/orH/Dz:zte2dw99f4y1IL/csQrH/
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0df31c64d84fc8204217bdc9d6b6e956_JaffaCakes118.doc windows office2003
nJmLzBXWK
NQKzJRAJmqhGjV
JuljlCOB