Behavioral task
behavioral1
Sample
c8719625163f8b2c1a5989f0c7be15e9_JaffaCakes118.doc
Resource
win7-20240704-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
c8719625163f8b2c1a5989f0c7be15e9_JaffaCakes118.doc
Resource
win10v2004-20240802-en
15 signatures
150 seconds
General
-
Target
c8719625163f8b2c1a5989f0c7be15e9_JaffaCakes118
-
Size
968KB
-
MD5
c8719625163f8b2c1a5989f0c7be15e9
-
SHA1
4c51bb51dd5ba82fb8c9de91118d0734b0992dbe
-
SHA256
ce812f0680f7c86ea21823eb5754442fa88c131a1025930b64b35e91e4963cea
-
SHA512
9e692dad2795a9bcd61b563beb9df5f754188bda21b99c4c1b224b0980e6e1311e3a33131e7c13161fa178903e97ffcb74c344d7686d0546cad018423b8fefa8
-
SSDEEP
24576:V84Dk9sKBwlOSJxqGAuvB97L88Sio5FSVPEHN/rZQ:V8l9xeOS83SS1i
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c8719625163f8b2c1a5989f0c7be15e9_JaffaCakes118.doc windows office2003
ThisDocument
Module1
sdghfgjfgkgkghk