Behavioral task
behavioral1
Sample
cd93700f51d10e6a9dc83aee520e7594_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd93700f51d10e6a9dc83aee520e7594_JaffaCakes118.xls
Resource
win10v2004-20231215-en
General
-
Target
cd93700f51d10e6a9dc83aee520e7594_JaffaCakes118
-
Size
138KB
-
MD5
cd93700f51d10e6a9dc83aee520e7594
-
SHA1
9812ece66c4fcf5d242ec31d6a909e72d5ff6fba
-
SHA256
e48388101517eb170c2ecd6ecb2d1f682d5e185b2c9f844fe83a99917d82f3a4
-
SHA512
3b5a9d4d527a1f3f47291fd2b8308dc17bd8897955ac9fffb686ad003027561e7b7518e8ddaef4082e1521f6a72ee22df73802c199265ee5df0f145eb157bbc2
-
SSDEEP
3072:9k3hOdsylKlgxopeiBNhZFGzE+cL2kdA7c6YehWfGNtUHKGDbpmsiiUv2K+lrXqH:9k3hOdsylKlgxopeiBNhZF+E+W2kdA7J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
cd93700f51d10e6a9dc83aee520e7594_JaffaCakes118.xls windows office2003