Behavioral task
behavioral1
Sample
413bd16983ee371d2955416354a17b2c_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
413bd16983ee371d2955416354a17b2c_JaffaCakes118.xls
Resource
win10v2004-20240226-en
General
-
Target
413bd16983ee371d2955416354a17b2c_JaffaCakes118
-
Size
108KB
-
MD5
413bd16983ee371d2955416354a17b2c
-
SHA1
80109e4a31a19fc5a93f69863354ecb23cea7027
-
SHA256
5457145d1709f6828a743ebe4ab34c74345647d7caca86d715db1cb52a7c596e
-
SHA512
1453e62285b816c090a048ed7f166301499aee6a7c62e3644e3483c32db3d8ecea962910b6e309d06dfd291a0b7e5ea3db16d1883130d9411dc264e97a2a138a
-
SSDEEP
3072:vdcKoSsxzNDZL2Qiw+4868O8KKA4Rdbwrk3hbdlylKsgqopeJBWhZFGkE+cL4Lxp:FcKoSsxzNDZL2Qiw+4868O8KKA4Rdbw/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
413bd16983ee371d2955416354a17b2c_JaffaCakes118.xls windows office2003