Behavioral task
behavioral1
Sample
71136aab6cae39e138fab55e2f00a583_JaffaCakes118.doc
Resource
win7-20240508-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
71136aab6cae39e138fab55e2f00a583_JaffaCakes118.doc
Resource
win10v2004-20240426-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
71136aab6cae39e138fab55e2f00a583_JaffaCakes118
-
Size
76KB
-
MD5
71136aab6cae39e138fab55e2f00a583
-
SHA1
164bc374e50c579c0557ec32cd573afc907db362
-
SHA256
aba5bddcd0584140102c5a904be47f3025b6ba796114bbd2039e272bf26d7be7
-
SHA512
c1ed00716505531ef2a2c60ddd0e06e9a1bba03f10483a18f5eab07e91cd4283ebf03ea9f100d34657821e30cb1f17d0e0a273824cddeab4addef4523be7300e
-
SSDEEP
1536:3nptJlmrJpmxlRw99NBq+ax4+6MT4I6Dhl93tCX:Zte2dw99fUn8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
71136aab6cae39e138fab55e2f00a583_JaffaCakes118.doc windows office2003
iSdjSRmNQOkTwv
TXzCzHDQcMfERI
tazVZMRsLt