Behavioral task
behavioral1
Sample
322b82692918f84c7dd69f85c76679a8_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
322b82692918f84c7dd69f85c76679a8_JaffaCakes118.xls
Resource
win10v2004-20240226-en
General
-
Target
322b82692918f84c7dd69f85c76679a8_JaffaCakes118
-
Size
57KB
-
MD5
322b82692918f84c7dd69f85c76679a8
-
SHA1
d93f36cbc5f0b63f2f58b88d424fa5a9dac0d15c
-
SHA256
c484128dd841e555c87737e157687d7ce4939ffcfe9dadd4424cf4ab2f0443ed
-
SHA512
67e5decd146d9727d1a1437b4f9afa686e65357e554aba120bacfd08b79bebbaaf82c14400fcaa4627bd91791ff97e6ae7c01157d183ab3fe61396c8d7aed103
-
SSDEEP
1536:SaOmdvxHlcaQPy0iWYOcG4BDhnxD7oOEgxEtjPOtioVjDGUU1qfDlaGGx+cL2Qn7:SaOmdvxHlcaAy0iWYOcG4BDhnxD7oOER
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
322b82692918f84c7dd69f85c76679a8_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1