Behavioral task
behavioral1
Sample
f6c858b96631e2d12647ec224ecbf352_JaffaCakes118.doc
Resource
win7-20240708-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
f6c858b96631e2d12647ec224ecbf352_JaffaCakes118.doc
Resource
win10v2004-20240802-en
11 signatures
150 seconds
General
-
Target
f6c858b96631e2d12647ec224ecbf352_JaffaCakes118
-
Size
112KB
-
MD5
f6c858b96631e2d12647ec224ecbf352
-
SHA1
0699cdb1906f37e20d728981a84b7a4753c55f18
-
SHA256
f1c00bf538d7b103feb62fbaa9c2a007dc13cba35145a49da53009d4429b8425
-
SHA512
e6f90659cd8ff76b0024b8178f8dfad9c936dbd7de6ddca1f78b7ca178da5d3b20af16ba955b33234061724681765a301a349f9d5d020e4c76d01cc6e7926a69
-
SSDEEP
1536:NptJlmrJpmxlRw99NB8+aXiV4UEXU0zqF1voveYhnpC:Tte2dw99fx5IzqFyew
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f6c858b96631e2d12647ec224ecbf352_JaffaCakes118.doc windows office2003
nHawNUvzilwUu
YvMwozGoSVhPO
swKwGVoAV