Behavioral task
behavioral1
Sample
7716d54db82808c48a2a5b21abe2b604_JaffaCakes118.doc
Resource
win7-20240419-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7716d54db82808c48a2a5b21abe2b604_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7716d54db82808c48a2a5b21abe2b604_JaffaCakes118
-
Size
163KB
-
MD5
7716d54db82808c48a2a5b21abe2b604
-
SHA1
a3a10487de31322ab5b456a099bc6c9dd376b556
-
SHA256
113aed7ff9cb4912dc8b8e029f98ebf8822869220b5af578b7570433858aeceb
-
SHA512
8b7cbb842b0a0b325a8f828e7d18bcfcee1c0661d762681f223437146cd9fa061eb3ac7e46c1ab33c4d9c7a8555a3030256ccbc49ce4a6146ca01eef3d384f34
-
SSDEEP
3072:o8Vm1Yjkuy3EJzTs5bgXk8kk62wuJbJtwWqH:o8E1M5zv62wuJD8H
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7716d54db82808c48a2a5b21abe2b604_JaffaCakes118.doc windows office2003
ThisDocument