Behavioral task
behavioral1
Sample
b7065220fbbbf38449cf5ef7a0beaf54_JaffaCakes118.doc
Resource
win7-20240508-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
b7065220fbbbf38449cf5ef7a0beaf54_JaffaCakes118.doc
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
b7065220fbbbf38449cf5ef7a0beaf54_JaffaCakes118
-
Size
98KB
-
MD5
b7065220fbbbf38449cf5ef7a0beaf54
-
SHA1
bb088883b5845e2dd6a076c3c77c90b5d59362a9
-
SHA256
bc9fdf93ee7bd76a8bdbc233e162733b62bc15839029e5a984db7c20e4255c3b
-
SHA512
2c6de91dda13eefe2f730e71aae11464b08b08094d9a781acbd1521a08bdd59906d58c80359db36919904f89335ea40dad0ca724eaaf6b080c0cd4e87591e114
-
SSDEEP
1536:GTxjwKZ09cB7y9ghN8+mQ90MTA+aKD+s/5OG:+xjnB29gb8on35
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b7065220fbbbf38449cf5ef7a0beaf54_JaffaCakes118.doc windows office2003
MmazDcCwmYFJ
iCFPfdGTShhz