Behavioral task
behavioral1
Sample
eb016236613647c59e5e4ca81904718f_JaffaCakes118.pps
Resource
win7-20240903-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
eb016236613647c59e5e4ca81904718f_JaffaCakes118.pps
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
eb016236613647c59e5e4ca81904718f_JaffaCakes118
-
Size
70KB
-
MD5
eb016236613647c59e5e4ca81904718f
-
SHA1
b3c73896095ae23ae05a6c942325ab904c811203
-
SHA256
1a88536d2164d6c3b6d050a5f766dd703b69a49d8174586993b1266f806a5b22
-
SHA512
fe75bc076224a4f8496c494a3b1b82e55c3679a6528752f35d5e9098ec92f9c16b5f3269e9723b5d351259cdbf95ec30552b7393c6383979036a9af3be9bb6c2
-
SSDEEP
384:xPxZeYFrxFTBBKQsDXsHiEuTJ1KaitmjYOMFR98clFo39D:ZrxFtiEeJGOMFb8cjo
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
eb016236613647c59e5e4ca81904718f_JaffaCakes118.pps windows office2003