Behavioral task
behavioral1
Sample
da40a8b03485c660e28949ca56cfb25a_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
da40a8b03485c660e28949ca56cfb25a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
da40a8b03485c660e28949ca56cfb25a_JaffaCakes118
-
Size
90KB
-
MD5
da40a8b03485c660e28949ca56cfb25a
-
SHA1
f0015a88322cb7f108839e62529b314c1d80ff48
-
SHA256
96f338fb96ba1e6ccbb29e8ebea72665b0f4562a782fe02042efc25e63f8828a
-
SHA512
69a32fdc596dd9ccb9f29be480c5cc1435325c5be3b3bff7cecbe83f3e0196f92e1cc9338d5f911e5b77b66a6477b1437302f5e0fc6a7be2f6b648a209df9ab9
-
SSDEEP
1536:+Bocn1kp59gxBK85fBnx+amHIUAHcAdAbRjf7ZD+gB:X41k/W487oRnZlB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
da40a8b03485c660e28949ca56cfb25a_JaffaCakes118.doc windows office2003
vUOGvVsqYQkM