Behavioral task
behavioral1
Sample
881a9d2aafe87a1801c7f675afeb1658_JaffaCakes118.doc
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
881a9d2aafe87a1801c7f675afeb1658_JaffaCakes118.doc
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
881a9d2aafe87a1801c7f675afeb1658_JaffaCakes118
-
Size
16KB
-
MD5
881a9d2aafe87a1801c7f675afeb1658
-
SHA1
0705541e5ab861fd0b5ab2fe395be3cee825638f
-
SHA256
9c7283ec78a713f799a664856ac504481ae2787630598874858d712e4468accb
-
SHA512
e51b26d3719cb1ecb61d7b6b13b29ee1d080251fa21c329b3b930dec8baaa02d7a6d42b759bde365c07d7e31bd67d55231432542773e6d324006acfcb88de3af
-
SSDEEP
384:YzczI+Kno9R2R50jyhSir2YSirm8mhto:YzczI+KoHQdhSwsGmh0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
881a9d2aafe87a1801c7f675afeb1658_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros