Behavioral task
behavioral1
Sample
7a80176edb4de52db3991271a947e02f_JaffaCakes118.doc
Resource
win7-20240419-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7a80176edb4de52db3991271a947e02f_JaffaCakes118.doc
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
7a80176edb4de52db3991271a947e02f_JaffaCakes118
-
Size
855KB
-
MD5
7a80176edb4de52db3991271a947e02f
-
SHA1
2bdd3c9b6b9441c879cd031659ad13ab40e405d2
-
SHA256
beded477528d3dc0de6195fc2384beffe948873667c65f0e97000b30edae9608
-
SHA512
b79b7c9e7f1ab38dff96cf7044e7988e395cff63073cf21e2f4d5f3fc4111784b491e49e58582122c03893c69b2e9c98bdf4a444e2a7efcf9ffc723120b76c02
-
SSDEEP
24576:JcmlDDgoxozOf4+LVwE2n1ioktclp3LKL8sL:JBkouzOf4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7a80176edb4de52db3991271a947e02f_JaffaCakes118.doc windows office2003