Behavioral task
behavioral1
Sample
778e36d4666cb974072baed674317ab2_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
778e36d4666cb974072baed674317ab2_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
778e36d4666cb974072baed674317ab2_JaffaCakes118
-
Size
77KB
-
MD5
778e36d4666cb974072baed674317ab2
-
SHA1
02a82a2f3e193884c9f2a530ca6b777102939e98
-
SHA256
b310420513b142dbff7001fb48a391591d97ffc1ed7564805c978fe60a971c51
-
SHA512
089d9a5988459062a736e14446d536f46385437da2faffe00e651cfdcaae6b1579b1fcac25b1ffa1040adf955e0bc182e353e746cb4e773c80ba8355b32eda1b
-
SSDEEP
1536:3nptJlmrJpmxlRw99NBq+axRc6MT4I6Dhl93tCX:Zte2dw99fHn8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
778e36d4666cb974072baed674317ab2_JaffaCakes118.doc windows office2003
iSdjSRmNQOkTwv
TXzCzHDQcMfERI
tazVZMRsLt