Behavioral task
behavioral1
Sample
8cf018f8783702cda8c356cb96458f20_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
8cf018f8783702cda8c356cb96458f20_JaffaCakes118.doc
Resource
win10v2004-20240426-en
9 signatures
150 seconds
General
-
Target
8cf018f8783702cda8c356cb96458f20_JaffaCakes118
-
Size
145KB
-
MD5
8cf018f8783702cda8c356cb96458f20
-
SHA1
bfd72457dbfe6e8a9028e1fd7d467066b404df42
-
SHA256
8abc16d440a3e9793e83658d77590f6c77e87041481a23c0ee2bbb16d0e555a2
-
SHA512
6f2cc1d1206c11ffe0d230dd092283316ee2a0413f47c2daa9942f5782a1d605a2c76bb5a8f748c8bb9bcb2954fe5ab9acae2bb6730d8a101882efb8ace194e5
-
SSDEEP
3072:f/s1dirz4eeVuDcu/imbRCLMVW24hcswdiXiP3:Sdi/xtk
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8cf018f8783702cda8c356cb96458f20_JaffaCakes118.doc windows office2003
ThisDocument