Behavioral task
behavioral1
Sample
6106fc132736a323bfae474fcb1fd08b_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
6106fc132736a323bfae474fcb1fd08b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
8 signatures
150 seconds
General
-
Target
6106fc132736a323bfae474fcb1fd08b_JaffaCakes118
-
Size
391KB
-
MD5
6106fc132736a323bfae474fcb1fd08b
-
SHA1
c45d7269e740752df954359f789c4973dd16b63b
-
SHA256
25edbc83f140eafc75cfa8c97b4913cb6153f55d97681d17550bd0b8c709cb01
-
SHA512
7e347a2ebb4ea510d1151edd5cb89b94395c881b98b4aa238c9c42f801cb3fb53b5cbd60598c29b3baa537be6a5470a92b76baa2b64d7f416893c2ae1f75e62e
-
SSDEEP
6144:niIpBWik+MmAQoMfMWDQeTo59x9r+RSwujd+Ao7p:iIprkNmAQo0MWDQTbKQTjLot
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6106fc132736a323bfae474fcb1fd08b_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros
Module1