Behavioral task
behavioral1
Sample
2ff4e7e34f15898eabdfbc5fa04e547a_JaffaCakes118.doc
Resource
win7-20241010-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ff4e7e34f15898eabdfbc5fa04e547a_JaffaCakes118.doc
Resource
win10v2004-20241007-en
4 signatures
150 seconds
General
-
Target
2ff4e7e34f15898eabdfbc5fa04e547a_JaffaCakes118
-
Size
178KB
-
MD5
2ff4e7e34f15898eabdfbc5fa04e547a
-
SHA1
3275a4e8b1e64caa717df2392cbb3b0b2af16c88
-
SHA256
0741da6f887aa5f824717074c72ad0780cee4e5fb7e7ede8943367c4e28f22c9
-
SHA512
c099a548352899c888ec757292c883641d6e2f74aec5c7550ef03c96e0e471f1208dade34014f67fd0f4f68249d4e7c6743607e2f43b3b12009b574ac5f3c3e2
-
SSDEEP
3072:iLyXf/hfQU2wMgN4tqtXMh9xsI3Am3ZXXljYEDYaMlC:iLyXf/NQU2wMZtqt8F/w
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2ff4e7e34f15898eabdfbc5fa04e547a_JaffaCakes118.doc windows office2003