Behavioral task
behavioral1
Sample
5ec8820375cdb54b5233aa94d274968c_JaffaCakes118.doc
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ec8820375cdb54b5233aa94d274968c_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
5ec8820375cdb54b5233aa94d274968c_JaffaCakes118
-
Size
145KB
-
MD5
5ec8820375cdb54b5233aa94d274968c
-
SHA1
b70b97eb0503b91682d30ce51223df00d9fedd45
-
SHA256
de81b2f27e61e697c82c2d4fcd3f2a6d4bf154140459e9c9206434eff0688d15
-
SHA512
8557afa4035373e72fdf1204e1235a4613f0f86e13df5a5ca6c3ca1584e21c50f97275a64484e32a97ed011241df3d35736cd7f12c7f51cad9259e09d6573244
-
SSDEEP
3072:1c4xkHcc2fKwPe81FnKBf+v9/gnmo4NJJEt8/7biSetT:j8KlPeYnKB29BPNPo
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5ec8820375cdb54b5233aa94d274968c_JaffaCakes118.doc windows office2003
ThisDocument