Behavioral task
behavioral1
Sample
1ebda23e70a43134ee06e0af8ad82121_JaffaCakes118.doc
Resource
win7-20240215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ebda23e70a43134ee06e0af8ad82121_JaffaCakes118.doc
Resource
win10v2004-20240419-en
8 signatures
150 seconds
General
-
Target
1ebda23e70a43134ee06e0af8ad82121_JaffaCakes118
-
Size
96KB
-
MD5
1ebda23e70a43134ee06e0af8ad82121
-
SHA1
cddd6a9738b5374c99c1561f6675fadea6666a57
-
SHA256
5a4b3b42a94ed12f0e46d1dbc142421e4cf61b1b5ada1df3e9231c349c8c6d25
-
SHA512
4010ced13abd55a0b6fc7a145eed12328acc588a4b2be40a7ced18da16ecc55eaa275554d9366175cd2624d9225de7b071577c0740da2857d69c7b29532276df
-
SSDEEP
1536:qjsF0FglR+aJRk5XxNvMXW3m6AvLIe4AESa54Wxa:0jFakpxN0X2AjISaNM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1ebda23e70a43134ee06e0af8ad82121_JaffaCakes118.doc windows office2003
pUiHXGEBpmEah
ubwNPjYdFY
SmvtrzDDMXHY