Behavioral task
behavioral1
Sample
a6860ba4b789f44f34590f931eae5c6f_JaffaCakes118.doc
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a6860ba4b789f44f34590f931eae5c6f_JaffaCakes118.doc
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
a6860ba4b789f44f34590f931eae5c6f_JaffaCakes118
-
Size
14KB
-
MD5
a6860ba4b789f44f34590f931eae5c6f
-
SHA1
fd88a4649be8d624e750c7605fead8f3f9f93717
-
SHA256
fbaabe1894f5f83cdb1c2a3661bbec700016fd5522928e44ab599fc2e2bc5227
-
SHA512
b397851f698b4d8d18e84ab9867206a2028a67b1e8028be9d001eb166a2a18d7215609d3a49f415b2908ea86072a5ec43e80b5b7d816cd2c45c2a653f5203668
-
SSDEEP
384:NSv6uwkv4P0jpG1vn6Sqx+p8Fi+s55tij:NSEkOwQCp+p8FgK
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a6860ba4b789f44f34590f931eae5c6f_JaffaCakes118.doc windows office2003
ThisDocument
Module1