Behavioral task
behavioral1
Sample
f31c57fd4b561fc20690e064305fa46b_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f31c57fd4b561fc20690e064305fa46b_JaffaCakes118.xls
Resource
win10v2004-20240226-en
General
-
Target
f31c57fd4b561fc20690e064305fa46b_JaffaCakes118
-
Size
757KB
-
MD5
f31c57fd4b561fc20690e064305fa46b
-
SHA1
a0f435a6b2defbc50769852d1a0f39d696465539
-
SHA256
8a28e59bf65cbc8aeaf26a2a16acdb8e5bba844e5bf067b7743fecf8f78a4548
-
SHA512
a745d1c7441ae1a2211bcec11e457e13739ebfef6a9e70ddeec38d497bd08306e35a88b68e0bb541cbdc63354cd46770bd5fc485fb6e9c46e6755ef07e889d7a
-
SSDEEP
12288:usDfX9f3FHMWzQQpg4H7UWS0Zxt+i7KiSsqCN1YmTyLr0jDvEMZBaUib:N9fJMVEb6qtUUNng0jIMDaj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f31c57fd4b561fc20690e064305fa46b_JaffaCakes118.xls windows office2003