Behavioral task
behavioral1
Sample
f6010602af25513e5e82d4640807d08d_JaffaCakes118.doc
Resource
win7-20241010-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
f6010602af25513e5e82d4640807d08d_JaffaCakes118.doc
Resource
win10v2004-20241007-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
f6010602af25513e5e82d4640807d08d_JaffaCakes118
-
Size
90KB
-
MD5
f6010602af25513e5e82d4640807d08d
-
SHA1
cc045aa7f68e85e0877364db80399bdbf0ecdbf6
-
SHA256
ae4f24905553e34675bfa73dc2048fbe0c05170945c1c7e0fbcf38bfd5005c6c
-
SHA512
bb59090bac795cd8b7e6cfc4d520654046c9a0f41914a5c8e7df6948b785108d7b672a58e13aa25a5b7684b05ad15d760b270a44f903d7506d4abe88e2bb72e3
-
SSDEEP
1536:qptJlmrJpmxlRw99NBr+a239xfP2G9HdpkX:2te2dw99fy9MqHsX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f6010602af25513e5e82d4640807d08d_JaffaCakes118.doc windows office2003
LkjIKwSUwwkTnX
SWiwTuuijUF
XUmzwalJE