Behavioral task
behavioral1
Sample
f6458b3f7c15a53012b8ccbd67a7eaff_JaffaCakes118.doc
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f6458b3f7c15a53012b8ccbd67a7eaff_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
f6458b3f7c15a53012b8ccbd67a7eaff_JaffaCakes118
-
Size
35KB
-
MD5
f6458b3f7c15a53012b8ccbd67a7eaff
-
SHA1
33865f6e7fc10b1d265a369cc829bfba5970bdf3
-
SHA256
12443a3ac7b23228ff69e2e88ad770295ca1f027d5975cf858873cea87f52772
-
SHA512
a0515320904b851c5642564578858c043c0bb50327f9d864afc36f8fea09d46628cb0d7dbca69e97c5c0d50bb995b1682b9f014d735a09f92e26c1f5792d966b
-
SSDEEP
768:ubT7HiqJ3QNLLTd2CyjViZFgnX/hfxN6RLQ1OlN5R:uvZ5U2jVfX/hXcQkXT
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f6458b3f7c15a53012b8ccbd67a7eaff_JaffaCakes118.doc windows office2003