Behavioral task
behavioral1
Sample
bdd1296381d2e9cfe053b2081ecd8f49_JaffaCakes118.doc
Resource
win7-20240705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bdd1296381d2e9cfe053b2081ecd8f49_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
bdd1296381d2e9cfe053b2081ecd8f49_JaffaCakes118
-
Size
13KB
-
MD5
bdd1296381d2e9cfe053b2081ecd8f49
-
SHA1
2c5a4b83e8a7475f00c71c5103f967428823d524
-
SHA256
2e952282e241e68761aefc330910d8ee193368db94309f36b4948a41f6eea48a
-
SHA512
69924c457112950bd5107e113901483d1f1c591d3ab8985dddaca6d3eeb8625b2d33d9124b23a991b2c9275ba7149764d6e5a006d88672dc5c436f3c93b7f1ee
-
SSDEEP
192:yEMsKoO2N0js42H67DzmD+pyd/4YWYQbttJ1a:2sTN0jsv+pu/4Rztt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bdd1296381d2e9cfe053b2081ecd8f49_JaffaCakes118.doc windows office2003