Behavioral task
behavioral1
Sample
c07bbadeb3e0e21710918b6aa4dc0659_JaffaCakes118.doc
Resource
win7-20240705-en
13 signatures
150 seconds
General
-
Target
c07bbadeb3e0e21710918b6aa4dc0659_JaffaCakes118
-
Size
267KB
-
MD5
c07bbadeb3e0e21710918b6aa4dc0659
-
SHA1
f225c68b6047c23ec50fc522ef8c4045edf69c9b
-
SHA256
77ae62fe8eea41cfd33a6b211ff1eada6c23ff37313a6712c6ea9917487780e9
-
SHA512
0da603228ab94d557df595891faa9dc6d31b01b453c33e36377aa40bb509b9aefb1243efa41ed2bc1633cde006746a543674ebb5584cfc352f201f69332dcc89
-
SSDEEP
6144:YNCwQK3RpVS7G4SVuz1QzLhxztsZGPwv:IQQLGSVuz1QHhxztCv
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c07bbadeb3e0e21710918b6aa4dc0659_JaffaCakes118.doc windows office2003
ThisDocument
QfAlPia
TL3ADZOM
MzPONdl
f