Behavioral task
behavioral1
Sample
ef9e1f36218b4b52e29884ec805855e3_JaffaCakes118.doc
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ef9e1f36218b4b52e29884ec805855e3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
ef9e1f36218b4b52e29884ec805855e3_JaffaCakes118
-
Size
307KB
-
MD5
ef9e1f36218b4b52e29884ec805855e3
-
SHA1
c22cc0d6978d354691efdbc52e96bff989508918
-
SHA256
3767f95bcfdf6e7e3eeba5cc6fe712a3af8f3fccccacdfec639d576e908ba9dd
-
SHA512
198237207bca8c5bf1194b4bd7b9902a89330a997239d79c4566c145ec6ede0258f5a5f1e5719abf0851d56834324e23d590d486d76f7856dd1662433018f4cb
-
SSDEEP
3072:F6WbRSxPAkQ9KX7iQPJUMs5Qe0ASCaOdh:+ykQitvMh
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ef9e1f36218b4b52e29884ec805855e3_JaffaCakes118.doc windows office2003