Behavioral task
behavioral1
Sample
ebccaed823003d51c30ef986d1b1d37b_JaffaCakes118.doc
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
ebccaed823003d51c30ef986d1b1d37b_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
ebccaed823003d51c30ef986d1b1d37b_JaffaCakes118
-
Size
157KB
-
MD5
ebccaed823003d51c30ef986d1b1d37b
-
SHA1
c340e1c2582ec48f790c7781799b4ce3c2a9d815
-
SHA256
9d181725fe215258f4beda140f1687e9090bc616674d1c585872c728f795aa8f
-
SHA512
44bea884fd5b9b17bace876706372887ff498088772581c759dc7401292be8efda1e366bd137e1fa11141db90deb3354858f82fc0be708f866ae2bc0cd0b8a37
-
SSDEEP
3072:PgZrDAP84ttTV9uFHy/dn0UweMCaEiqlE1fkc5jAef:PoD+84tmBqEc+A
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ebccaed823003d51c30ef986d1b1d37b_JaffaCakes118.doc windows office2003
ThisDocument
Module1