Behavioral task
behavioral1
Sample
91c8e59c6c0edf594753332633b28a8b_JaffaCakes118.doc
Resource
win7-20240215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
91c8e59c6c0edf594753332633b28a8b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
91c8e59c6c0edf594753332633b28a8b_JaffaCakes118
-
Size
73KB
-
MD5
91c8e59c6c0edf594753332633b28a8b
-
SHA1
5f24cbe153215e46f8971e130f08eade5337f8e5
-
SHA256
b757dfc83a53b45bb6fff106e717f2e4d53af227788e6005395aa7aeceaf88c4
-
SHA512
3d96d20b59c22dc03b1ca6e139c119963d3b880c48c667279d684854dea616af4d2c982a0c1dbfa957686946e45ac7ab12f29813934f0e001e1f91c32f7387f7
-
SSDEEP
768:GpJcaUitGAlmrJpmxlzC+w99NBk+1oWns7Vp8id4e:GptJlmrJpmxlRw99NBk+aWWt4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
91c8e59c6c0edf594753332633b28a8b_JaffaCakes118.doc windows office2003
FuhHWuXwnnsiE
jWbuWcuduoXih