Behavioral task
behavioral1
Sample
155e4df45d76b2eb71bf9ab861c22672_JaffaCakes118.doc
Resource
win7-20240221-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
155e4df45d76b2eb71bf9ab861c22672_JaffaCakes118.doc
Resource
win10v2004-20240419-en
8 signatures
150 seconds
General
-
Target
155e4df45d76b2eb71bf9ab861c22672_JaffaCakes118
-
Size
109KB
-
MD5
155e4df45d76b2eb71bf9ab861c22672
-
SHA1
b7f89131b27712b11abc8579706a36568ab677f4
-
SHA256
19be1af94c60453bf5e2eb4f31a4c4ad2ee65e8bf8a9656ded27b01c98aef8cb
-
SHA512
eeca50fa5b70c9c1f9b048227e0bafcc7884581bee743a4edff0bbb9a5b47cd7bd4ff124406fa9380fe3f2f56bb1e8f1d1fe52db3efe069b107ca37238829a68
-
SSDEEP
1536:3Lpdkscv7mvPw5qi4TSlThDvnDa3kLOf:1Nt9izlT/Kf
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
155e4df45d76b2eb71bf9ab861c22672_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros