Behavioral task
behavioral1
Sample
104c49a6dd5b2372b79369493bbb3f64_JaffaCakes118.doc
Resource
win7-20240419-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
104c49a6dd5b2372b79369493bbb3f64_JaffaCakes118.doc
Resource
win10v2004-20240419-en
10 signatures
150 seconds
General
-
Target
104c49a6dd5b2372b79369493bbb3f64_JaffaCakes118
-
Size
66KB
-
MD5
104c49a6dd5b2372b79369493bbb3f64
-
SHA1
8f59106a5d92d260212417cfe1969d26121a9d0a
-
SHA256
b2b9bc6526cafa92180d938494ae99627cd8fb264a98673f77e3756e425b4277
-
SHA512
10d82618294af240b74c5dddd419468aeea21c48b89967f4c23911d1b269186c7f0ec43efe38ab3d490f49d6847e181b0bb6b75136b5c4b85cb54ed4a342aa53
-
SSDEEP
768:hqq8F/8ls5aRtdN35O2SNQklEd0KKq1Suvc3PswdMMqM:t8Fha/5OUki0q1dwdMMqM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
104c49a6dd5b2372b79369493bbb3f64_JaffaCakes118.doc windows office2003