Behavioral task
behavioral1
Sample
964032f59b767e21958f1a2f19c09b19_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
964032f59b767e21958f1a2f19c09b19_JaffaCakes118.doc
Resource
win10v2004-20240226-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
964032f59b767e21958f1a2f19c09b19_JaffaCakes118
-
Size
178KB
-
MD5
964032f59b767e21958f1a2f19c09b19
-
SHA1
a6a5ee1947e094ae7b252a29e1d8ce7c6fbf866f
-
SHA256
05f915802be3f0ac41b7def08c13d0ed294ae4e305ba89f82dfa0afbd749fac0
-
SHA512
e1ac34a621715a8e77a7eeb2bfb6afc72f8df143f203310600b1f61d8ae880f9e86d840c1e1e49559396cf38523c756c374740a7a6bd480e58430bfbb039d97b
-
SSDEEP
3072:4xjnB29gb8onLcfBXHtB1mNIRFO+gIPwI3g:4xygcfZHtB1mNV+voD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
964032f59b767e21958f1a2f19c09b19_JaffaCakes118.doc windows office2003
hBlmhVqiEGGD
zclsCzDfTzz