Behavioral task
behavioral1
Sample
8a654ea1a1584b129bd2a167da3af843_JaffaCakes118.doc
Resource
win7-20240220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
8a654ea1a1584b129bd2a167da3af843_JaffaCakes118.doc
Resource
win10v2004-20240426-en
4 signatures
150 seconds
General
-
Target
8a654ea1a1584b129bd2a167da3af843_JaffaCakes118
-
Size
703KB
-
MD5
8a654ea1a1584b129bd2a167da3af843
-
SHA1
8ae4fd289bcdc1de0b5b63ad606a26da618c0151
-
SHA256
a23a8dbeb5e22c28c01eefb64de9183748e820b574c6a909f213bce39cc94039
-
SHA512
cdf13eaae1d6965e975bf3e07674ea0616b22177f081efe5486f8610ca9e716029cd0b59a97c00f5038646680e95f94ddd0792ad1ea9f656c9af36471ccf703b
-
SSDEEP
12288:nYkNUZQl+6VWXBi7O9DXKUR43J0HQVqe6ITfEjRUEMlNn03:N/ln+BioKbOsq+Tb0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8a654ea1a1584b129bd2a167da3af843_JaffaCakes118.doc windows office2003
ThisDocument