Behavioral task
behavioral1
Sample
ad783170b99dbb19ef1c2090a28c1cfe_JaffaCakes118.doc
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad783170b99dbb19ef1c2090a28c1cfe_JaffaCakes118.doc
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
ad783170b99dbb19ef1c2090a28c1cfe_JaffaCakes118
-
Size
11KB
-
MD5
ad783170b99dbb19ef1c2090a28c1cfe
-
SHA1
a4ceb510a925916ca9af69f51e3031ff3987353e
-
SHA256
c2f9c51056424b7397af3d373292561162af9c3be883e285ff4e64974d78ac69
-
SHA512
7e1ce10ed898c3537c50e628c11d656082abbccb6695729b552bd7d4329b88961897b6bfc60d14322260174f449676cdfe6551255dbedc97b12f22f5b514a9cb
-
SSDEEP
192:ofZjOE0j/wqFeRtCR0KJAS/SNnwLts3azlKaS:QZCE0j/wqEtm0mUNnwBs3az
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ad783170b99dbb19ef1c2090a28c1cfe_JaffaCakes118.doc windows office2003
ThisDocument