Behavioral task
behavioral1
Sample
6454ed4dd10dee9aac274394218ad78d_JaffaCakes118.doc
Resource
win7-20240419-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
6454ed4dd10dee9aac274394218ad78d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
6454ed4dd10dee9aac274394218ad78d_JaffaCakes118
-
Size
149KB
-
MD5
6454ed4dd10dee9aac274394218ad78d
-
SHA1
7fe35481075fb22265bebbef297bb3e4d5e91f3e
-
SHA256
18921eafa333987b16c94b0894fabba2850ad7e776dab51534dc9066b26665cf
-
SHA512
58a30aa374945abbe9e98cc99387621f69095ba65b2a1f990d24dc6193eaf3e3883954b42758d6433925928087e278de3ef8ec97468348f8ac920a77da19017c
-
SSDEEP
3072:fte2dw99fV98C9DB4SEiz5/xXd5D73JCU:VHdw7j9oiz5/1dZ73J
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6454ed4dd10dee9aac274394218ad78d_JaffaCakes118.doc windows office2003
uplwidTTizusH
BBVDJJJBaic
JfzaJBPMsX