Behavioral task
behavioral1
Sample
915e87f11ac5d5940642bc45773cba93_JaffaCakes118.doc
Resource
win7-20240419-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
915e87f11ac5d5940642bc45773cba93_JaffaCakes118.doc
Resource
win10v2004-20240426-en
9 signatures
150 seconds
General
-
Target
915e87f11ac5d5940642bc45773cba93_JaffaCakes118
-
Size
77KB
-
MD5
915e87f11ac5d5940642bc45773cba93
-
SHA1
c2c5db51cee1ecb48b155a195dc91d4cfc3291a6
-
SHA256
71149b457bea5c3cd9746f7a00ba499e42e461acf87f260bdc64b17e12af64d4
-
SHA512
5a3d395c44ec1e2f88a4ed6d84cb685b17a591f18f2054baa49dc66ec15e5e1dd2d6d34e5f7ba2def7654ac45d01a7232d827ce4c7ef8d8e74be2916c6a2ef9b
-
SSDEEP
1536:QEhnX/fn0rqK+KcAH4Tif7qNcyCSWMZ5tlX3JAZ:PRP0rqKLH4GWcTQnJA
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
915e87f11ac5d5940642bc45773cba93_JaffaCakes118.doc windows office2003
ThisDocument