Behavioral task
behavioral1
Sample
951d9f3320da660593930d3425a9271b_JaffaCakes118.doc
Resource
win7-20240508-en
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
951d9f3320da660593930d3425a9271b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
951d9f3320da660593930d3425a9271b_JaffaCakes118
-
Size
59KB
-
MD5
951d9f3320da660593930d3425a9271b
-
SHA1
6bd48d65d8e32d37a509080be53643791a5dcbbe
-
SHA256
faf003c38758cf70b12bc4899714833e4713096c8f66163e753b3f0e70f2ba28
-
SHA512
071e25665034ba0c355b289c7f981f39ab5ff8be83fb748852711e759b71b4db1ada9acfcc12c80c6d322e1cc779dbb45b76d99a4318f4c816871cd71ebf93f1
-
SSDEEP
768:po4G9l+pdEC3ymEYkZtbnsWtofatVViq5y:po4ajeyVyfa+
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
951d9f3320da660593930d3425a9271b_JaffaCakes118.doc windows office2003
ThisDocument