Behavioral task
behavioral1
Sample
901b6773735a46a120e82a1c85140be0_JaffaCakes118.doc
Resource
win7-20240221-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
901b6773735a46a120e82a1c85140be0_JaffaCakes118.doc
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
901b6773735a46a120e82a1c85140be0_JaffaCakes118
-
Size
85KB
-
MD5
901b6773735a46a120e82a1c85140be0
-
SHA1
b0d8b6485f104ac65ae97d41c4cc7f9474ff7555
-
SHA256
12f9a8c99798490cf35deaf4a33c1396fa295baa43703c09899a8c30c3e5a9d4
-
SHA512
db67cb9b485b6cf8bff48183a7109d90c1c39e0c60ca8fd39916a76b1901e947f0544b7cdec6dd736dc722e7a77dc08755473f6001b1313f954863cf80adf696
-
SSDEEP
1536:zijWrMocn1kp59gxBK85fB7+ajZhg5aPiAJv6jw6:zV41k/W48pjkL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
901b6773735a46a120e82a1c85140be0_JaffaCakes118.doc windows office2003
RQwaMrXj