Behavioral task
behavioral1
Sample
68f26248d12a0f90b841be966a92f0eb_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
68f26248d12a0f90b841be966a92f0eb_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
68f26248d12a0f90b841be966a92f0eb_JaffaCakes118
-
Size
91KB
-
MD5
68f26248d12a0f90b841be966a92f0eb
-
SHA1
844f455e80056d6d2d0e28118d16b062cf6b83c7
-
SHA256
573a40257ce731457d4ecc39bfab7cbc4a77e3235244f75e27b8594d9245201c
-
SHA512
a030f56a78924dac6db76b886264de24e4b82bc95293bf98dbe796c29edfcb989f26bbd089f61eccec190c17d4dd3c10747063b8a71fb9fa144b03b5c10a9212
-
SSDEEP
1536:hptJlmrJpmxlRw99NBRC+aTmLI0+FOd7Dz4q:/te2dw99f5+FOd3zL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
68f26248d12a0f90b841be966a92f0eb_JaffaCakes118.doc windows office2003
bjCNjSiHD
NvcwvibunTKk