Behavioral task
behavioral1
Sample
16b168cfd7f2eefeb02c3e3aa04083e8_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
16b168cfd7f2eefeb02c3e3aa04083e8_JaffaCakes118.doc
Resource
win10v2004-20240419-en
9 signatures
150 seconds
General
-
Target
16b168cfd7f2eefeb02c3e3aa04083e8_JaffaCakes118
-
Size
111KB
-
MD5
16b168cfd7f2eefeb02c3e3aa04083e8
-
SHA1
522988ade052d51b5dfde5d376effb4a3e693194
-
SHA256
0897bfaf976453945d5a85cd06dce30ed4056a7ed11e84eba631f3d1076d1022
-
SHA512
601c4d7c8b0c89a2a78553eeff1aff2c826e0428667b379119620847364ba7a69b56bfcd768dd769a5d50bd6d2d8ca35b482dbf3df2a09cc38369a79c15d6817
-
SSDEEP
1536:wHsddAm5zdI3Al+aguWKj7jnBz0tuNfEltl2S:323Albj77p4uilWS
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
16b168cfd7f2eefeb02c3e3aa04083e8_JaffaCakes118.doc windows office2003
OscBYbbNcFiGzm
IsBZjroFVSaMih