Behavioral task
behavioral1
Sample
68e89d88b7cca6f12707d5a463c9d1d8_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
68e89d88b7cca6f12707d5a463c9d1d8_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
68e89d88b7cca6f12707d5a463c9d1d8_JaffaCakes118
-
Size
983KB
-
MD5
68e89d88b7cca6f12707d5a463c9d1d8
-
SHA1
7aed1190356493472ffcf1eb2d7d61f1ea3e6809
-
SHA256
2727bf97d7e2a5e7e5e41ccbfd7237c59023d70914834400da1d762d96424fde
-
SHA512
7b340a082e1bbb6e1e9bc0c7afaca0c05e320526a8c4a2c488fd42f55bb9be71228b926ae6aa07d02a071a77190cc60c425ccb79e9ce9457204d136cd62029a1
-
SSDEEP
24576:6Y7AOG6Y68aJSHE33cewex77PwYjo3Y9:177G6YtaAEHcewiPJjo3Y9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
68e89d88b7cca6f12707d5a463c9d1d8_JaffaCakes118.doc windows office2003
ThisDocument