Behavioral task
behavioral1
Sample
c7583c3314352b95a859b1850241ec4c_JaffaCakes118.doc
Resource
win7-20240704-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
c7583c3314352b95a859b1850241ec4c_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
c7583c3314352b95a859b1850241ec4c_JaffaCakes118
-
Size
87KB
-
MD5
c7583c3314352b95a859b1850241ec4c
-
SHA1
686021b468397700f6cbba09d7374a4ba4a82afc
-
SHA256
6d1522b971a391ad16352b8cd205416729b99239fbc9101c43ad9c5b50f876c2
-
SHA512
f3ccbde93f73ddcd21c53219cd33b1563f051e76485d5bfe3715c46de712f7ac5f34ad17e01b32c485d0e1d1c61651ccb23089e38097fe2a4774a285c6737710
-
SSDEEP
1536:aptJlmrJpmxlRw99NBj+aIc0IvHsA99l:Gte2dw99f1UA99l
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c7583c3314352b95a859b1850241ec4c_JaffaCakes118.doc windows office2003
LUEBuKp
ciccFjHQiQ
oasizwwuo