Behavioral task
behavioral1
Sample
16ac1a2c1e1c3b49e1a3a48fb71cc74f_JaffaCakes118.doc
Resource
win7-20240221-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
16ac1a2c1e1c3b49e1a3a48fb71cc74f_JaffaCakes118.doc
Resource
win10v2004-20240419-en
6 signatures
150 seconds
General
-
Target
16ac1a2c1e1c3b49e1a3a48fb71cc74f_JaffaCakes118
-
Size
660KB
-
MD5
16ac1a2c1e1c3b49e1a3a48fb71cc74f
-
SHA1
8d5e3bed94115e93e51e67db815edbab10e35505
-
SHA256
bfb4fc96c1ba657107c7c60845f6ab720634c8a9214943b5221378a37a8916cd
-
SHA512
bc11ac0b40b4f26e180bf67a63ff21e7890187a020a8524d4ea0c7e14d2073e4be301fc58d5fbb758c6e4e3fccadd3f83efe02b803802c4b41ea2f3b08e9a04e
-
SSDEEP
12288:SawBxdJgMb37bdJSOELZ4uDVZRFR92hb4aMhI5om:Sa0xdJgMLCtLZ4wVxR9XB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
16ac1a2c1e1c3b49e1a3a48fb71cc74f_JaffaCakes118.doc windows office2003
ThisDocument
Module1