Behavioral task
behavioral1
Sample
d1f9a772a003fbce906937e55c757f71_JaffaCakes118.doc
Resource
win7-20240903-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
d1f9a772a003fbce906937e55c757f71_JaffaCakes118.doc
Resource
win10v2004-20240802-en
12 signatures
150 seconds
General
-
Target
d1f9a772a003fbce906937e55c757f71_JaffaCakes118
-
Size
93KB
-
MD5
d1f9a772a003fbce906937e55c757f71
-
SHA1
9332e2f048d25b4f91df6d3295bc8c62266818b0
-
SHA256
dde36643ab431aba63538ab48d71c79964c9cdbfa60b1ed18a9ce4cccdd80b69
-
SHA512
47efd3743d44ae8a71882bff10d6187c119e3b19f53eedf27ec8dd096cb2276b1d152954724873824f1d6e5ab4586946bfdea8772c7cb3112865df017cca5f95
-
SSDEEP
1536:lTxjwKZ09cB7y9ghN8+mQ90MTu+aZVMcHZWg44D8b:lxjnB29gb8on4MmIp4Yb
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d1f9a772a003fbce906937e55c757f71_JaffaCakes118.doc windows office2003
FiEKhpQXZPD
TIwfFIcHvUhE