Behavioral task
behavioral1
Sample
a964fac56acd9a0875ad386dcc072f62_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
a964fac56acd9a0875ad386dcc072f62_JaffaCakes118.doc
Resource
win10v2004-20240611-en
10 signatures
150 seconds
General
-
Target
a964fac56acd9a0875ad386dcc072f62_JaffaCakes118
-
Size
88KB
-
MD5
a964fac56acd9a0875ad386dcc072f62
-
SHA1
4a5df844d2663bc7f79e8f6a02993bf649aeefac
-
SHA256
9a2a39ad5b4964291e4e9e5b773f5f7a99a4e58cd736881829c86e7063f77f02
-
SHA512
71d7993a153ba03dd7128e615dcd60afb507bd0103509378399f80effe2d58eb7a38c8965689d578176184d94bdf1e85d2814d0745333f625e219099f9cb7a44
-
SSDEEP
1536:Shcv/qAocn1kp59gxBK85fBt+a9aK4GggyVoreRGKRZ:Dvo41k/W485jK7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a964fac56acd9a0875ad386dcc072f62_JaffaCakes118.doc windows office2003
jSVtZvA