Behavioral task
behavioral1
Sample
6cce3844ae7ae9cc8da0c5a2bd2842bc_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
6cce3844ae7ae9cc8da0c5a2bd2842bc_JaffaCakes118.doc
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
6cce3844ae7ae9cc8da0c5a2bd2842bc_JaffaCakes118
-
Size
121KB
-
MD5
6cce3844ae7ae9cc8da0c5a2bd2842bc
-
SHA1
41f165a10fd171f95b1ed658430a60a70bef54d2
-
SHA256
dad8170988a315cb1ec7522c6b096f5ec9d96843daab4c086471f7d68f5a3362
-
SHA512
75575407d61926758b3a2c864fe3005d4ad482e3e78d240b3dc0f676e7aa2f4ea53a581365f86078348c9cee7017f01b5dec15214f45982b09f0da114dd509ea
-
SSDEEP
3072:fte2dw99f/WinAm4A1qWQqy0cElDhCyw:VHdw7/WiAhqIY1w
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6cce3844ae7ae9cc8da0c5a2bd2842bc_JaffaCakes118.doc windows office2003
hjNGKJFchAuo
Hhiicvahw
XmZfWdq