Behavioral task
behavioral1
Sample
274b38030ba8f154a99c2b0f41d1c91c_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
274b38030ba8f154a99c2b0f41d1c91c_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
274b38030ba8f154a99c2b0f41d1c91c_JaffaCakes118
-
Size
401KB
-
MD5
274b38030ba8f154a99c2b0f41d1c91c
-
SHA1
aa7a1113074f689f482861e9032c36d0ed92b6dd
-
SHA256
90dc09e32009173cd4479c86c0f57324fdcb32d6153e91ac4677278b330ea4c3
-
SHA512
f4ce3f4d0dd86c4b56498fdd90d94beb6b795efbf6704d230131cbe478228ec42f054eb6f822c079eca6a55f36bb27ee1d6266f99bc9bfcba7b4b3bf61b47991
-
SSDEEP
6144:YxEtjPOtioVjDGUU1qfDlavx+W2Qn9ecnhDgxVKBPOltrbNlRfitYZb+tlqosm+J:p5bEtnPEtYZb+tX+W+x1Yg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
274b38030ba8f154a99c2b0f41d1c91c_JaffaCakes118.xls windows office2003
ThisWorkbook
Module1
Sheet2
Module2