Behavioral task
behavioral1
Sample
dff66676fd2d539a8b8259f152f7baf1_JaffaCakes118.doc
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dff66676fd2d539a8b8259f152f7baf1_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
dff66676fd2d539a8b8259f152f7baf1_JaffaCakes118
-
Size
12KB
-
MD5
dff66676fd2d539a8b8259f152f7baf1
-
SHA1
08617e925267784b996284de45401b6cf6689398
-
SHA256
8ffe132a0f733d56d8994ba0787c54e1e4899adf4db02dc71e13972b29280b0e
-
SHA512
7cb7038c6acb9627221c3fd3f36350c8344f8243a400750266f305525224ae5a8c6e12430cefee889c0b51ace7350a94718bf6e59aaa837c6e76da8e0ce51ba8
-
SSDEEP
192:gI5nRAgblQ6q4+pyqd1hy0FYq2C7k28Oba:Ig5Vh+pBvhy0f2C7k
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
dff66676fd2d539a8b8259f152f7baf1_JaffaCakes118.doc windows office2003