Behavioral task
behavioral1
Sample
7beb94f602e97785370fec2d059d54a5_JaffaCakes118.doc
Resource
win7-20240221-en
17 signatures
150 seconds
Behavioral task
behavioral2
Sample
7beb94f602e97785370fec2d059d54a5_JaffaCakes118.doc
Resource
win10v2004-20240508-en
17 signatures
150 seconds
General
-
Target
7beb94f602e97785370fec2d059d54a5_JaffaCakes118
-
Size
1.6MB
-
MD5
7beb94f602e97785370fec2d059d54a5
-
SHA1
53785a0d58b774125d702cdd70015be273348314
-
SHA256
153117aa54492ca955b540ac0a8c21c1be98e9f7dd8636a36d73581ec1ddcf58
-
SHA512
42b43f239f3da6381c635fb650794533bea7f7653fb6c8f39587f6add95b5204d3231eea1ae70a62cc7c5636b3470de1f7d75361b56b9f0ca2ba0cc2c22b3958
-
SSDEEP
24576:Q0wAYlC3fXFzCS3cosTu5A35zfbLzzFZ6:g6AzX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7beb94f602e97785370fec2d059d54a5_JaffaCakes118.doc windows office2003
ThisDocument