Behavioral task
behavioral1
Sample
7c9b683835d9a17ffd68b9b31ad8d54f_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
7c9b683835d9a17ffd68b9b31ad8d54f_JaffaCakes118.doc
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
7c9b683835d9a17ffd68b9b31ad8d54f_JaffaCakes118
-
Size
94KB
-
MD5
7c9b683835d9a17ffd68b9b31ad8d54f
-
SHA1
f856b0a21ae9b86c79f78dfa33b523b888bb7544
-
SHA256
3e0246e25f267a8673a55876b042f20bee8f1abd8ec631f65986bef6ce6566d8
-
SHA512
aee98385547eea6f7ea47adea03318c2922b20661daa2c9e833bff5a732cfe8dc825fcff6fac483fe3bb49fbc37bc0cc15501217a2b17ff031f9120b6f2f9119
-
SSDEEP
1536:U242WlCN36qJ60pgLtsw+FOkPowkPrq1Uv2o:xbVN36SgLtN+Fr6mGOo
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7c9b683835d9a17ffd68b9b31ad8d54f_JaffaCakes118.doc windows office2003