Behavioral task
behavioral1
Sample
d188d4ea5956c58923f341a849f39a14_JaffaCakes118.xls
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d188d4ea5956c58923f341a849f39a14_JaffaCakes118.xls
Resource
win10v2004-20240226-en
General
-
Target
d188d4ea5956c58923f341a849f39a14_JaffaCakes118
-
Size
138KB
-
MD5
d188d4ea5956c58923f341a849f39a14
-
SHA1
b44f4446df7e0e9d845334f6177934c5543dc3bc
-
SHA256
9d4082b43c5ac5f4d4dd72a64ec91b05a6fa7033eb6873e8a16997f595fcfa1c
-
SHA512
932a1ae2e2aad6fda112ccd02e2a1dd4fbe123b44dcc8e1732d40911c4e55222ef006a7eb36129ca38ae653de8f302e5f8400f0b2b9f634db4e701d8feb01a80
-
SSDEEP
3072:Mk3hOdsylKlgxopeiBNhZFGzE+cL2kdAWc6YehWfGvtUHKGDbpmsiimtmZyAqgIo:Mk3hOdsylKlgxopeiBNhZF+E+W2kdAWi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d188d4ea5956c58923f341a849f39a14_JaffaCakes118.xls windows office2003