Behavioral task
behavioral1
Sample
66669600ce4be4c77bd3b035215529f1_JaffaCakes118.doc
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
66669600ce4be4c77bd3b035215529f1_JaffaCakes118.doc
Resource
win10v2004-20240426-en
4 signatures
150 seconds
General
-
Target
66669600ce4be4c77bd3b035215529f1_JaffaCakes118
-
Size
458KB
-
MD5
66669600ce4be4c77bd3b035215529f1
-
SHA1
e4ed0f4602fedde0f5cc40ad3681f46a7abd32d4
-
SHA256
e310992ffd26f4d13a3cd8e7799a59f483e4320d538b3aa991a0fb42dfe11695
-
SHA512
1989c3f0cf725bee20cec1ada150683a223b4d743b00bdeb6f1d6e50bd9691be460781719535a61f7a1b8dd21996a8b730c7ff67ddd3415750a67afb8921eade
-
SSDEEP
12288:bXKoMFH9GoUUQfUNZa6JY8X8JM8rQ6Esz5JR:LCM2NwwYC8BJR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
66669600ce4be4c77bd3b035215529f1_JaffaCakes118.doc windows office2003