Behavioral task
behavioral1
Sample
b17fadd8407c63e438d999ddef7b85d7_JaffaCakes118.doc
Resource
win7-20240508-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
b17fadd8407c63e438d999ddef7b85d7_JaffaCakes118.doc
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
b17fadd8407c63e438d999ddef7b85d7_JaffaCakes118
-
Size
190KB
-
MD5
b17fadd8407c63e438d999ddef7b85d7
-
SHA1
a3d850a2bd19b09c5d14a8c3da74e49700de515e
-
SHA256
70bd94c2751f07ef23535e52791713992691cc518d03b36f8b20a80301b3ee83
-
SHA512
b6802e3c4c18073bb2187cf807236137a7fb2ce2dedc93d359398323fb79f21f192390ffbaa078ec961d950f16d18e5f5c3c24d164f6ad8c8313dfd59a2a51c3
-
SSDEEP
3072:LVT5slHjn25zWJ7GjRzyCrTGssrWUNRD5bi2Jt23:Z5slHCWYYCmoUjD5F2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b17fadd8407c63e438d999ddef7b85d7_JaffaCakes118.doc windows office2003
ThisDocument
Module1