Behavioral task
behavioral1
Sample
cf135f86c8bdf65c6519ea468ee0786a_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
cf135f86c8bdf65c6519ea468ee0786a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
cf135f86c8bdf65c6519ea468ee0786a_JaffaCakes118
-
Size
82KB
-
MD5
cf135f86c8bdf65c6519ea468ee0786a
-
SHA1
e515bc5f9be817a4570e510baca85e10f9696364
-
SHA256
aec1f2893f9e4e57fdd08db5f61d7e3bd2be1401e1ed509489b7f32f85e687d6
-
SHA512
6734a53012f3c45a7a01715da21030d727f29b23b5e2e5159c42f62b710706f8d8483b8be0a55ea52d6f8c23a4dfd0b57ff76fbda6d9a652e399a49990d03064
-
SSDEEP
1536:pptJlmrJpmxlRw99NBY+a6zcE9AlxXR7dHNB:Xte2dw99fFczXXBTB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cf135f86c8bdf65c6519ea468ee0786a_JaffaCakes118.doc windows office2003
hVjmXUfjsT
TlGDwozEkCdrB
DUcAahTi