Behavioral task
behavioral1
Sample
9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc
Resource
win7-20240419-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
9b117b9aac005a6fc047a214458e599d_JaffaCakes118
-
Size
166KB
-
MD5
9b117b9aac005a6fc047a214458e599d
-
SHA1
fe9ebb01e99ba191a4b736d17a45dcb783bf00d6
-
SHA256
585823d78240de4f41a50541f7d58b412958dff1c22025302f8487cb4aec7544
-
SHA512
11d8950cdacab9b99260428293314edcb412782d3015c1183683b49f19f7894f2fb32a70fca65ab3c778d5fc442c2db97b60b595d05d52645e274674f50f20d0
-
SSDEEP
3072:s6IB/NXCMUkuQ0vViAOPKWj77/JFwnxgV:IBHUk4vViAOPp77/JF+xgV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc windows office2003