Behavioral task
behavioral1
Sample
ff8ba20d115faebcaf09d9eb6f954069_JaffaCakes118.doc
Resource
win7-20240729-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff8ba20d115faebcaf09d9eb6f954069_JaffaCakes118.doc
Resource
win10v2004-20240802-en
9 signatures
150 seconds
General
-
Target
ff8ba20d115faebcaf09d9eb6f954069_JaffaCakes118
-
Size
149KB
-
MD5
ff8ba20d115faebcaf09d9eb6f954069
-
SHA1
d8f225174fe6f1f464f954eedaeef0453452c62f
-
SHA256
de883059dc699081ae98bd4b295be8972f4a3bf5e699265a97a422a91d8acfbb
-
SHA512
15be916ca0c6f796c72634bcd4f91360040468584ea06e824bdc6708c97a5ed4c3ef6b27cd093bb7717cfe87d5e6430f0b94f973fe2d90dd3166e86bcfb9f5fd
-
SSDEEP
3072:LVNx3L9Q7YV/o5Do7HR/GfFPlYvP5L4Un:hNxbC7YV/omalYvxL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ff8ba20d115faebcaf09d9eb6f954069_JaffaCakes118.doc windows office2003
WQpssBAARnWDt
ftojjKGYuWwmM