Behavioral task
behavioral1
Sample
de9d24103e84c38336c4149877b89d21_JaffaCakes118.doc
Resource
win7-20240903-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
de9d24103e84c38336c4149877b89d21_JaffaCakes118.doc
Resource
win10v2004-20240802-en
7 signatures
150 seconds
General
-
Target
de9d24103e84c38336c4149877b89d21_JaffaCakes118
-
Size
249KB
-
MD5
de9d24103e84c38336c4149877b89d21
-
SHA1
eb5178a87d3698b1af60c18e7c82f1f79b35334c
-
SHA256
1c72f575d0c9574afcfcaab7e0b89fe0083dbe8ac20c0132a978eb1f6be59641
-
SHA512
0abca6f9b87dea8e59e4ced3618a4d066c5484f1d07726955e00d8863b703a6422776a595a52e8d93d99d38b8f22b72c85572aedf86b4c8bbc1209962ea7d951
-
SSDEEP
6144:/wV2cc2c22222222222JgkV/ex5Ny+xyOJjksIPLWqb///E6:IVB+xtIPLWqb///E6
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
de9d24103e84c38336c4149877b89d21_JaffaCakes118.doc windows office2003
ThisDocument
dimidium
wednesday
adolfus