Behavioral task
behavioral1
Sample
09e1ebc5c7d77ed7c9e5eaaf4c630ded_JaffaCakes118.xls
Resource
win7-20240419-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
09e1ebc5c7d77ed7c9e5eaaf4c630ded_JaffaCakes118.xls
Resource
win10v2004-20240419-en
5 signatures
150 seconds
General
-
Target
09e1ebc5c7d77ed7c9e5eaaf4c630ded_JaffaCakes118
-
Size
266KB
-
MD5
09e1ebc5c7d77ed7c9e5eaaf4c630ded
-
SHA1
1bc247f071888b614b5dd522cc54f4776b42281c
-
SHA256
2c563cbb18e181b1590eea24b5d03e2e7d09a448ef0c7de1807a1b3cadd5e35f
-
SHA512
a7f36d267473533019e3fe87d5edeed369af7b6ac153a984b56754f8f5276541450aa7f0c65868f65c25db7bc86b436b9c3bc65b98c63f46498a1b29ee4c0430
-
SSDEEP
6144:dzPqQmd+77bSq9n+jDXpXzwPzrGqLS9ezMEWb4+a:du/d27b89XzCtP
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
09e1ebc5c7d77ed7c9e5eaaf4c630ded_JaffaCakes118.xls windows office2003