Behavioral task
behavioral1
Sample
745db86a63082c422777fb646723ab1d_JaffaCakes118.pps
Resource
win7-20240221-en
windows7-x64
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
745db86a63082c422777fb646723ab1d_JaffaCakes118.pps
Resource
win10v2004-20240508-en
windows10-2004-x64
18 signatures
150 seconds
General
-
Target
745db86a63082c422777fb646723ab1d_JaffaCakes118
-
Size
58KB
-
MD5
745db86a63082c422777fb646723ab1d
-
SHA1
41864d39e704ade8f560063b59b368c1031c3c40
-
SHA256
232f5aeb67a605446b4876aa000e202aeb2cc6bfea17d9156a1b18ccae3a4a00
-
SHA512
9a3d30179d3747e5dd1ae87378361f290c333816ca7877ae5aff03fe69cb0af8528f6fedfaa1a235b3f000c3f99cf9de8c44649126bea31605e1d5962740867a
-
SSDEEP
384:QzEIIk/7G6wXpzRprR+HpExvYzCoiCg/:34/7G6GzRprRyOvXoiCg
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
745db86a63082c422777fb646723ab1d_JaffaCakes118.pps windows office2003
Módulo1