Behavioral task
behavioral1
Sample
d3fcf9f5868afb025192037cf3164a5c_JaffaCakes118.doc
Resource
win7-20240903-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
d3fcf9f5868afb025192037cf3164a5c_JaffaCakes118.doc
Resource
win10v2004-20240802-en
11 signatures
150 seconds
General
-
Target
d3fcf9f5868afb025192037cf3164a5c_JaffaCakes118
-
Size
77KB
-
MD5
d3fcf9f5868afb025192037cf3164a5c
-
SHA1
13c70ca5429793393a50ce27517741eb613f7837
-
SHA256
aac219dff293ccaf9f8ec70575185c6579f723691cfc901c17f5095af439483f
-
SHA512
287f8e58ee6e151c06c18f28cbb4de30e7b5526e168e5d13c3a664c4f59808972daf56301913bc09832d462f505f891dd7fdddf3ba481a174cd3102f893283ab
-
SSDEEP
1536:CP6ocn1kp59gxBK85fBr+aAEZOXJ0NzNLpjI:Cf41k/W487wXqXLpjI
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d3fcf9f5868afb025192037cf3164a5c_JaffaCakes118.doc windows office2003
qLWJVzw