Behavioral task
behavioral1
Sample
d1bfc74c6eed0207d6a6e12d167c12ff_JaffaCakes118.doc
Resource
win7-20240708-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
d1bfc74c6eed0207d6a6e12d167c12ff_JaffaCakes118.doc
Resource
win10v2004-20240802-en
11 signatures
150 seconds
General
-
Target
d1bfc74c6eed0207d6a6e12d167c12ff_JaffaCakes118
-
Size
85KB
-
MD5
d1bfc74c6eed0207d6a6e12d167c12ff
-
SHA1
82612fc9011f77619b45d03eb103ba2978122f3a
-
SHA256
70a05adebd4aa55638d15c7771198a8d6355840f27aa4f58f0fd27bc32e9b399
-
SHA512
5b1fcb1981edf97d0ae57e0272939bb9a4e5a8d4aa9f5b111b22618d115886808baafa784b24c853d30bd77f49892ec12e2ca6e7b4b8b83fc2c2ec2411099834
-
SSDEEP
1536:Ffh9aLSfA1ocn1kp59gxBK85fBg+aAXCOw+MPxO:FfSI41k/W48hCHxO
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d1bfc74c6eed0207d6a6e12d167c12ff_JaffaCakes118.doc windows office2003
mjSjvKifLHZ