Behavioral task
behavioral1
Sample
b438c4cb55b41712e38324c2bc8d4b15_JaffaCakes118.doc
Resource
win7-20240704-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
b438c4cb55b41712e38324c2bc8d4b15_JaffaCakes118.doc
Resource
win10v2004-20240802-en
15 signatures
150 seconds
General
-
Target
b438c4cb55b41712e38324c2bc8d4b15_JaffaCakes118
-
Size
968KB
-
MD5
b438c4cb55b41712e38324c2bc8d4b15
-
SHA1
8d29cb5f99422dada065025d8ab90fa670a2a20b
-
SHA256
54bbde3c4ab96dfa02a81c9029d68dd0202c3002b4b542451d86d66b3c9ab52a
-
SHA512
5076978358d47217dd1774ceb385758350b86e652c9197c6b8d0f68d15c1d080f023e299a7c781de8bec14df220a41c550aa8ccf19438a733a1ca3ff1c4e3766
-
SSDEEP
24576:V84Dk9sKBwlOSJxqGAuvB97L88Sio5FSVPEHN/rZQ:V8l9xeOS83SS1i
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b438c4cb55b41712e38324c2bc8d4b15_JaffaCakes118.doc windows office2003
ThisDocument
Module1
sdghfgjfgkgkghk