Behavioral task
behavioral1
Sample
81225983775ac2bc59379f0fd1eb0f9a_JaffaCakes118.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
81225983775ac2bc59379f0fd1eb0f9a_JaffaCakes118.doc
Resource
win10v2004-20240426-en
9 signatures
150 seconds
General
-
Target
81225983775ac2bc59379f0fd1eb0f9a_JaffaCakes118
-
Size
106KB
-
MD5
81225983775ac2bc59379f0fd1eb0f9a
-
SHA1
aec703993d0e5172a8ced35921ecf83b5cc36164
-
SHA256
bb6987e69a840b935853d8d48e04e999ad31871e90f36879416c0cd869247630
-
SHA512
8270bb3c881058103938a1ce8380c0b8aa675c26f4b7827c254752aee14124192ba46ec6d845b6002022a66bdd1a273a7393fbcd3496249eac043e81f1b17c8c
-
SSDEEP
1536:kZjU1vKHTl6Gz1+agFof52IVtqh7SgZxA3dtV:WU1Cl5xGhOKxAt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
81225983775ac2bc59379f0fd1eb0f9a_JaffaCakes118.doc windows office2003
MwvQXlFYLAM
TWsSKiaVwtTDK