Behavioral task
behavioral1
Sample
d74f7d7a0aac2e65efa773d332802ace_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
d74f7d7a0aac2e65efa773d332802ace_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
d74f7d7a0aac2e65efa773d332802ace_JaffaCakes118
-
Size
109KB
-
MD5
d74f7d7a0aac2e65efa773d332802ace
-
SHA1
9b623c9ef99438ff96101984ca8ad2eed702c523
-
SHA256
44a709e8f1b2cee0bffb86e80475a919638d9da578dab46932052c826231982d
-
SHA512
7ca0b514445f53013bb75834dc676df86761390cfbda1b985b09d913c08d128f5cc05d24102d46e3752fb80e5cbadf19d41a5a54c7568501a6d574335442a2a4
-
SSDEEP
1536:+TxjwKZ09cB7y9ghN8+mQ90MTm+axCOJECnr6GrZ:GxjnB29gb8onxOJ9nRr
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d74f7d7a0aac2e65efa773d332802ace_JaffaCakes118.doc windows office2003
jKoJTiHJWESm
bbEwSbp