Behavioral task
behavioral1
Sample
0d32128c5b6ae94200a79e41384ad7f3_JaffaCakes118.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0d32128c5b6ae94200a79e41384ad7f3_JaffaCakes118.xls
Resource
win10v2004-20240419-en
General
-
Target
0d32128c5b6ae94200a79e41384ad7f3_JaffaCakes118
-
Size
86KB
-
MD5
0d32128c5b6ae94200a79e41384ad7f3
-
SHA1
24fc1f5a56fd9542ec8fb63c8c69c76f53b0ecee
-
SHA256
423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a
-
SHA512
c44544660ff85ad65b28aa540a426da113345760a9862a13c77fabaf68ecfdc38c4d3c23014dccf057a691e1ae0091339d6e64048b7cff8355e7d1eca3d71fd3
-
SSDEEP
1536:5/dvxHlcaQPy0iWYOcG4BDhnxD7oOEYxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAL+:5/dvxHlcaAy0iWYOcG4BDhnxD7oOEYxL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0d32128c5b6ae94200a79e41384ad7f3_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Sheet2