Behavioral task
behavioral1
Sample
8d53569ccbbc71c205c317c61843c045_JaffaCakes118.doc
Resource
win7-20240419-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
8d53569ccbbc71c205c317c61843c045_JaffaCakes118.doc
Resource
win10v2004-20240426-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
8d53569ccbbc71c205c317c61843c045_JaffaCakes118
-
Size
137KB
-
MD5
8d53569ccbbc71c205c317c61843c045
-
SHA1
4a93a2bd46c95aa231f9207f7cf1a29028da68d8
-
SHA256
f763d74e2db1ee98b4265c698c0c821c147bc9ab583b361338482e62ce291dd7
-
SHA512
3f5b32ffce094a1d57f7a2c313d2177c1dcd743fc82cc2881b900e83444594a68541c237d46596bee3a2ad93eb0a2232ba02fbd0e1f70aee9cd705c5d5c5f99a
-
SSDEEP
3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8d53569ccbbc71c205c317c61843c045_JaffaCakes118.doc windows office2003
HXbEGlvJu