Behavioral task
behavioral1
Sample
d1ca82da641dc6a8bd9db12fdf300884_JaffaCakes118.doc
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
d1ca82da641dc6a8bd9db12fdf300884_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
d1ca82da641dc6a8bd9db12fdf300884_JaffaCakes118
-
Size
172KB
-
MD5
d1ca82da641dc6a8bd9db12fdf300884
-
SHA1
ae41d523b8434f62a7973eed37df47502e35b5ce
-
SHA256
dd8d97a659b2f4e5e6ea0f539a42e934f33669a3a0fb16d882a81c6f556551f1
-
SHA512
c8572ba487b8bd8acb42d0a41f9336ae0ea3b54e395f587ca1439e3421e3743a40fd5807767a7b408dfbe063c81ea70f12027625097633dedaa70ffe6693e455
-
SSDEEP
3072:j+kGxMCFJcEJJ3BAqddUYgD4j6NyWshzQS4VxQMN/rFjvnH:jtqbTnBAq1H8XN/JvH
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d1ca82da641dc6a8bd9db12fdf300884_JaffaCakes118.doc windows office2003
ThisDocument