Behavioral task
behavioral1
Sample
9d7cb858c95dc395c70d35c16ca21251_JaffaCakes118.doc
Resource
win7-20240508-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
9d7cb858c95dc395c70d35c16ca21251_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
9d7cb858c95dc395c70d35c16ca21251_JaffaCakes118
-
Size
89KB
-
MD5
9d7cb858c95dc395c70d35c16ca21251
-
SHA1
106036d522d5f722ae5508d358b5e918558e7511
-
SHA256
29390b9ee891dbeac9519a65a1eaf199a398a502076599e5ced5c7856f1574a7
-
SHA512
06fe9cfc1b1e476f0d458f0bb0a7b9d11bf08b5b41d8798feb9e16c8863f6eb4464c3028f50afff19281d22e46b47e715e5183cc9c15b936a7c0bcaa830247c6
-
SSDEEP
1536:JptJlmrJpmxlRw99NBO+aAXIrlnKchqXN076KC0It4oC:3te2dw99fZ2vR1It4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9d7cb858c95dc395c70d35c16ca21251_JaffaCakes118.doc windows office2003
QWAVCmbWUGi
vlIoOfNZCBLsbf
jIOiqzzJmz