Behavioral task
behavioral1
Sample
beddeedec0eb344afdbf51b70e8205c6_JaffaCakes118.doc
Resource
win7-20240704-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
beddeedec0eb344afdbf51b70e8205c6_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
beddeedec0eb344afdbf51b70e8205c6_JaffaCakes118
-
Size
150KB
-
MD5
beddeedec0eb344afdbf51b70e8205c6
-
SHA1
bd2199ac78f7b2ac587aa48fd17f534e6db727e6
-
SHA256
057ee5a6b0654fc4dc2d28faaa2af8ae6300fe0e60121670d213d76d9389bb53
-
SHA512
2c5d2fa7a66765f90ba0f91a0a38b886962443de27e4afde74e012b52a3841c081b4c08b4ccddcb44533385761a14b1404d9884c9466e67bc98a6d3d45ad467f
-
SSDEEP
3072:fte2dw99fs98C9DB4SEiz5/xXd5D73JCU:VHdw749oiz5/1dZ73J
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
beddeedec0eb344afdbf51b70e8205c6_JaffaCakes118.doc windows office2003
uplwidTTizusH
BBVDJJJBaic
JfzaJBPMsX