Behavioral task
behavioral1
Sample
19a1f6c337a8fc5779e7094386751cd0_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19a1f6c337a8fc5779e7094386751cd0_JaffaCakes118.xls
Resource
win10v2004-20240226-en
General
-
Target
19a1f6c337a8fc5779e7094386751cd0_JaffaCakes118
-
Size
138KB
-
MD5
19a1f6c337a8fc5779e7094386751cd0
-
SHA1
2c255cb5e8cf104b4bbac7b47589b63a5edc0f64
-
SHA256
ecc4f7d2b9204f21be814dbe03ece38b6934fcf1a37c6b848979a2e5a9f29e61
-
SHA512
9bf6bacb4cf88339a1acbbae40f56d0f9997f4163feff34cb926b3aa7a58e0f3fab136fefe8c90278823851538dea3c16172424e8adbdc417aa0fc4455079cfb
-
SSDEEP
3072:9k3hOdsylKlgxopeiBNhZFGzE+cL2kdA7c6YehWfGNtUHKGDbpmsiiiv2K+lrXqH:9k3hOdsylKlgxopeiBNhZF+E+W2kdA73
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
19a1f6c337a8fc5779e7094386751cd0_JaffaCakes118.xls windows office2003