Behavioral task
behavioral1
Sample
ffd5276b620edc1110b4d2be2af86434_JaffaCakes118.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ffd5276b620edc1110b4d2be2af86434_JaffaCakes118.xls
Resource
win10v2004-20240412-en
General
-
Target
ffd5276b620edc1110b4d2be2af86434_JaffaCakes118
-
Size
134KB
-
MD5
ffd5276b620edc1110b4d2be2af86434
-
SHA1
0340b89b5b78bbe0ea53c5a6ac6110737dc00249
-
SHA256
f15d81061f758dbcd06aeff487b4c184c1fa60fe747dc25eda9a0481170d3ed2
-
SHA512
d1d22009fb704b1e876b7f3f39ec386005c8e904713cbe74fea84179c8f965ffa1dc902469f3eb6781c58c87d613986b2964af037c11ad7408ce8d0f216c60f4
-
SSDEEP
3072:ok3hOdsylKlgxopeiBNhZFGzE+cL2kdAwc6YehWfGotUHKGDbpmsiioati+0LsC:ok3hOdsylKlgxopeiBNhZF+E+W2kdAwK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ffd5276b620edc1110b4d2be2af86434_JaffaCakes118.xls windows office2003