Behavioral task
behavioral1
Sample
4782f1a8899f03daaf12c99fb60fbdd8_JaffaCakes118.doc
Resource
win7-20240419-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
4782f1a8899f03daaf12c99fb60fbdd8_JaffaCakes118.doc
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
4782f1a8899f03daaf12c99fb60fbdd8_JaffaCakes118
-
Size
77KB
-
MD5
4782f1a8899f03daaf12c99fb60fbdd8
-
SHA1
d6d40d2adf85017ac44fe9755d9d74ae9791bad4
-
SHA256
ef851b781aa4e9497006f57d25bb7e83237742df2ca4c8003101fcb95b01c514
-
SHA512
d8c2bb0198a82e615ad574a9ff06a80c2ab7168ee6fd70aa5fe2551cce0cd9ae9e959cd2366e68e55ae3dfa9d88bbb890e1e9a1eba08c7f7c4a7223f0a37e055
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5LuB2DZrVeoBE:Qte2dw99fHuBYZrom
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4782f1a8899f03daaf12c99fb60fbdd8_JaffaCakes118.doc windows office2003
dGmbmtWbCXbuEh
WnQTVBapd
AIdTOmiMwSr