Behavioral task
behavioral1
Sample
3f3ec0fa57bd3e669ce82742576c90f5_JaffaCakes118.xls
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f3ec0fa57bd3e669ce82742576c90f5_JaffaCakes118.xls
Resource
win10v2004-20241007-en
4 signatures
150 seconds
Errors
Reason
office: expecting BOF
General
-
Target
3f3ec0fa57bd3e669ce82742576c90f5_JaffaCakes118
-
Size
22KB
-
MD5
3f3ec0fa57bd3e669ce82742576c90f5
-
SHA1
2fc99c855c76de0bc491e99f3f92a57350f44373
-
SHA256
a1d952c88ddd8075f72113dc3aff0934199de0a959869e2234bda00e68a9c971
-
SHA512
eced03c839717bffe5c44e20da748ab8ef1e4380ed7d571d50881ea2babba17577583c1710a3c18d43879b7c8d7b23b5fcae9fac1b27013d449aa1f0c2397a3f
-
SSDEEP
384:dVGRrVZd+mm/JSTSa9YDn/Tp3yhT0FcyOaH:HGR/d+mmEeatL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3f3ec0fa57bd3e669ce82742576c90f5_JaffaCakes118.xls windows office2003