Behavioral task
behavioral1
Sample
61a93c67dbe831274e14795305afc681_JaffaCakes118.doc
Resource
win7-20240508-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
61a93c67dbe831274e14795305afc681_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
61a93c67dbe831274e14795305afc681_JaffaCakes118
-
Size
85KB
-
MD5
61a93c67dbe831274e14795305afc681
-
SHA1
4800614e77148822325fdd6a012ff5db8d08cc4f
-
SHA256
2cda89bd9cbc1c71ca3df9a192eaa2b51b8176d66ff537b62f8162ea7e8fa3f6
-
SHA512
38673591d9b952780b5353751d24c01e9422afc807bd1b961402984605afe19196421cb7d5d46f38484ce6444a70cfcb5eacb87c32cfd1a6551f0476eab56843
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5YuB2DZrVeoBE:Qte2dw99fsuBYZrom
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
61a93c67dbe831274e14795305afc681_JaffaCakes118.doc windows office2003
dGmbmtWbCXbuEh
WnQTVBapd
AIdTOmiMwSr