Behavioral task
behavioral1
Sample
db36d6a0613d53ab149bcef0eab64476_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db36d6a0613d53ab149bcef0eab64476_JaffaCakes118.xls
Resource
win10v2004-20240226-en
General
-
Target
db36d6a0613d53ab149bcef0eab64476_JaffaCakes118
-
Size
168KB
-
MD5
db36d6a0613d53ab149bcef0eab64476
-
SHA1
2b00d4f8a1af3c2fb604a29056b836a31d35f9cf
-
SHA256
9c5e9e59b3e97102933a3791a0b43e0e309237e0a70995ee5a5d9e5ccbe9e1b2
-
SHA512
190fc1e988650f689a3d970b2303bbb7c578d7804b7ce17bb72d5b06ebb2654b8b9252afb4d98384f561088f1f4668f9f89c4dbab3e85c0bebde08b2941f3cc7
-
SSDEEP
3072:Uk3hOdsylKlgryzc4bNhZFGzE+cL2knAaKKWXQ3kl/GVMfliRx4J2iSAqsaHHIas:Uk3hOdsylKlgryzc4bNhZF+E+W2knAaY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
db36d6a0613d53ab149bcef0eab64476_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Module1