Behavioral task
behavioral1
Sample
dad1e1990efa48941d034ba85e8cebd0_JaffaCakes118.doc
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
dad1e1990efa48941d034ba85e8cebd0_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
dad1e1990efa48941d034ba85e8cebd0_JaffaCakes118
-
Size
273KB
-
MD5
dad1e1990efa48941d034ba85e8cebd0
-
SHA1
2f0a2b37a83c58b33b12d26fa5b95820777aa36b
-
SHA256
e24d3e1f29da50e99f6c3bed7b926f14045cd9c7b70059c6d67d429ca4ef60fd
-
SHA512
9deed553585815ad90cb30d1d2a2ac37706704db516dc081f8087d37cea2dca15e2783c1f143076af140989b078db5dd77fb0bb4c1df6ab0cc3885f26343e9b7
-
SSDEEP
6144:AxMZuQ6+z4F6aL0+IejZNkyctyv8yjLU4+YgP5Ww:ll6hXL0mjZNkZIL8H
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dad1e1990efa48941d034ba85e8cebd0_JaffaCakes118.doc windows office2003
ThisDocument
SCpxNjy9
zBYUt0k