Behavioral task
behavioral1
Sample
d2e69d8be678035ca493970d50bb5fcb_JaffaCakes118.doc
Resource
win7-20240903-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
d2e69d8be678035ca493970d50bb5fcb_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
d2e69d8be678035ca493970d50bb5fcb_JaffaCakes118
-
Size
181KB
-
MD5
d2e69d8be678035ca493970d50bb5fcb
-
SHA1
b3fc77d5086f16330b011aab7da4190300166234
-
SHA256
1706fbe760eab15d7b66ce7af36c484b20553554010b0e99ea9aee7d291d6a8e
-
SHA512
28e89b87d02921e6548e046445acc114d7000e55e798b392b9285c71f9f838778a24b42530a67944c237464b8858ba084108ca51a51507b3501028e32f12feb0
-
SSDEEP
3072:x5S2/q0aVVo6aA7uDgZylYYkKPlmp1AEkkPJ:xM2C0aVNa6uEytkCE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d2e69d8be678035ca493970d50bb5fcb_JaffaCakes118.doc windows office2003
ThisDocument
oXFzZmt
EqwthwCA
JZulwbcv
ipUQZZR