Behavioral task
behavioral1
Sample
e7fd187a43d78111e3fc603ce736030e_JaffaCakes118.xls
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
e7fd187a43d78111e3fc603ce736030e_JaffaCakes118.xls
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
e7fd187a43d78111e3fc603ce736030e_JaffaCakes118
-
Size
863KB
-
MD5
e7fd187a43d78111e3fc603ce736030e
-
SHA1
169b42e6abc1f14e1a1adbe696e8b709ceeae65d
-
SHA256
96038491dc934481f3f6a119d4c0952569118481e7fc01c9c4ba836980dbf302
-
SHA512
fa3ba3c3998c2372078e035ad0e952d8eaad7be38d545f88d741ac2c35e3a557f8c8db4c19eddc0339c715f13d2babbc35456f0324151f668e7d4af97a9c1fea
-
SSDEEP
12288:jZQKbiRY2mXetLe9ehub/YL8b5gl/AXYAxwG:pWR5tLe9eOwL8coW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e7fd187a43d78111e3fc603ce736030e_JaffaCakes118.xls windows office2003
StartUp
StartUp_2
StartUp_3
StartUp_4
StartUp_5
StartUp_6
StartUp_7
StartUp_8
StartUp_9