Behavioral task
behavioral1
Sample
bd84a6d519a8020601bb49de49ccbd51_JaffaCakes118.doc
Resource
win7-20240419-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
bd84a6d519a8020601bb49de49ccbd51_JaffaCakes118.doc
Resource
win10v2004-20240611-en
10 signatures
150 seconds
General
-
Target
bd84a6d519a8020601bb49de49ccbd51_JaffaCakes118
-
Size
84KB
-
MD5
bd84a6d519a8020601bb49de49ccbd51
-
SHA1
2f81a283f1af4af5c9e5a8b389b4d36f76856cdf
-
SHA256
c2e295682051df4f4269cdd4c878aa09423ef2b87fd8728d6048b019b422e6dc
-
SHA512
f3f412c24ac5de4ecb36d68e473ca8e6e9c186a497439ea2c6fc33e0bc6cdb928822d93ebdbc4adb23b637376cf7d27826eb44ed2667a2c6875fcf8c18db1783
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5BuB2DZrVeoBE:Qte2dw99fduBYZrom
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bd84a6d519a8020601bb49de49ccbd51_JaffaCakes118.doc windows office2003
dGmbmtWbCXbuEh
WnQTVBapd
AIdTOmiMwSr