Behavioral task
behavioral1
Sample
f69e0c4ffefc328a357999ddbdfc2e01_JaffaCakes118.doc
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f69e0c4ffefc328a357999ddbdfc2e01_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
f69e0c4ffefc328a357999ddbdfc2e01_JaffaCakes118
-
Size
15KB
-
MD5
f69e0c4ffefc328a357999ddbdfc2e01
-
SHA1
1061419589f9ee67b4f2c3d756924ff9a399b672
-
SHA256
094eaf9951d98d3f0895a41bc287eb7b76261ae2e6fa897fad5d76b8f8588aaf
-
SHA512
7785b3f8248ec6f8d49c4dbddbb6b00c8b33e8bcc9158500f5695561febd625e5ed05d2f2cac1c0ced4317ef70785373e6d52fb1ae4f1304fb7c8894eef3a40c
-
SSDEEP
384:1lnYJqKbM2S0jTjzBxp6uhyZTgCmB8tB:TYzbMhczp6uhyZUQ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f69e0c4ffefc328a357999ddbdfc2e01_JaffaCakes118.doc windows office2003
ThisDocument