Behavioral task
behavioral1
Sample
f021c61f92f51e94256a7cebdae7cf2d_JaffaCakes118.doc
Resource
win7-20240903-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
f021c61f92f51e94256a7cebdae7cf2d_JaffaCakes118.doc
Resource
win10v2004-20240910-en
7 signatures
150 seconds
General
-
Target
f021c61f92f51e94256a7cebdae7cf2d_JaffaCakes118
-
Size
153KB
-
MD5
f021c61f92f51e94256a7cebdae7cf2d
-
SHA1
b94daf7148bedb4f677e2ee3dfafbf8885160655
-
SHA256
f122c8ea181a55cdb867ede8fbb90049f06bafcee65c00ad254099f0a1868b7f
-
SHA512
382e30b3d289e25d18e04d75594589d58e672b6bc1017585c85222150779a928d06cf2e1325745ce7f6e0c1a02449a9d89b38a511d1765c2e8edb3afdf9f029d
-
SSDEEP
3072:5VNx3L9Q7YV/o5Do7HR/GfFPlYvPg2gR:zNxbC7YV/omalYvI2S
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f021c61f92f51e94256a7cebdae7cf2d_JaffaCakes118.doc windows office2003
LXkzdYWYjvWjR
UIhEzNLZzWDXzn