Behavioral task
behavioral1
Sample
03d2bf6afcc1de9febf3d13074f6f620_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03d2bf6afcc1de9febf3d13074f6f620_JaffaCakes118.xls
Resource
win10v2004-20240419-en
General
-
Target
03d2bf6afcc1de9febf3d13074f6f620_JaffaCakes118
-
Size
245KB
-
MD5
03d2bf6afcc1de9febf3d13074f6f620
-
SHA1
1a849065ed14be82e8792f10927ee3a5c2921091
-
SHA256
a1505185c5bf429602be81bdccb17cb63eccdc537f67b3d1c5257e7a68e46d59
-
SHA512
599ca7a88f60f06bcd69abd07ef530e99a884a5ac8d3f0515b12bcc8aeea8d1b09a46fb43ce88fec734f5e864d9628787ec913ea078005cdc5449184be39d4f8
-
SSDEEP
6144:2zXq/NdUrA6jRtguK7QLP5mDF0RQYnCP/oNEDTOMKan1b9OHraos2d3YhC6bRzex:2tEXOMK8HiIUDrHzzD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
03d2bf6afcc1de9febf3d13074f6f620_JaffaCakes118.xls windows office2003