Behavioral task
behavioral1
Sample
db85192b9dd75985b68df714e3c4d5ba_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
db85192b9dd75985b68df714e3c4d5ba_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
db85192b9dd75985b68df714e3c4d5ba_JaffaCakes118
-
Size
250KB
-
MD5
db85192b9dd75985b68df714e3c4d5ba
-
SHA1
84788015910c1e205de32f363d71feb3ad3ceadd
-
SHA256
a0dd72b63810f1d2580e4d21ab34b34d38c0df60e786854174d4346073738b9b
-
SHA512
36f2cbb653381a1d27d4a9c43d904c2bdc51095612df3fd3e4ef4d418758ebd605bc9b4c627e31004ef6ecfdd3bec01de1cfb49fb4a4b806fe3c2b4057880e1e
-
SSDEEP
6144:jLLbQGKJezUG8eQBAPMaOlVTI+bhYqXxRkeLr2Fhj:V6eiacVTIERkeLr2Fhj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
db85192b9dd75985b68df714e3c4d5ba_JaffaCakes118.doc windows office2003
ThisDocument
accursion
activation
modtri