Behavioral task
behavioral1
Sample
185fb63d27f42d842d0818bf84a27b95_JaffaCakes118.doc
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
185fb63d27f42d842d0818bf84a27b95_JaffaCakes118.doc
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
185fb63d27f42d842d0818bf84a27b95_JaffaCakes118
-
Size
176KB
-
MD5
185fb63d27f42d842d0818bf84a27b95
-
SHA1
8d7ef03443cf0c2fa495e52d33d9f488dde21a67
-
SHA256
07b3ab8fc3d68e5a5f67e682768587befdeb9fe6a1817dd1158981ecc6e2a5b6
-
SHA512
bf0f200abc1a62b51f8e456deaf8573e1a70255ce1ffc316be3400550a6d5ac7cbf5528460e06faf69ef7488f1a93d7b5c2cf4411898813b568b733112bc25a9
-
SSDEEP
3072:28Vm1Yjkuy3EJzTB9zW3VehJHS9E1WEGZydfkhU9CcqF:28E1MlWNwS29C
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
185fb63d27f42d842d0818bf84a27b95_JaffaCakes118.doc windows office2003
ThisDocument