Behavioral task
behavioral1
Sample
bfd7c5e70bed5e134e9fb76cf55e5dfc_JaffaCakes118.doc
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bfd7c5e70bed5e134e9fb76cf55e5dfc_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
bfd7c5e70bed5e134e9fb76cf55e5dfc_JaffaCakes118
-
Size
35KB
-
MD5
bfd7c5e70bed5e134e9fb76cf55e5dfc
-
SHA1
7c1d38779a3ff9c621ebbb1cc0703ab1c5b1f81d
-
SHA256
411a42bca924f105f33bd1f632489d1fa90531abc1ae1c999bacf579ccdc28bb
-
SHA512
584a63725ef7ba148e808b2437fdd1f15baed7c964fbf77dc061b4dc0cc859aeb5e6ea0911376ff73874c2987d5995d5e47fcb34ba42b84af47c59c94514fbb8
-
SSDEEP
768:m0V/2UST7HiqJ3QNLkOw5EZqYgQJ7Md+o5/f5lV:m0xDQZ5voysgx
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bfd7c5e70bed5e134e9fb76cf55e5dfc_JaffaCakes118.doc windows office2003