Behavioral task
behavioral1
Sample
3a1f83b75779fcfc08fc1697652e2c59_JaffaCakes118.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a1f83b75779fcfc08fc1697652e2c59_JaffaCakes118.xls
Resource
win10v2004-20240426-en
General
-
Target
3a1f83b75779fcfc08fc1697652e2c59_JaffaCakes118
-
Size
63KB
-
MD5
3a1f83b75779fcfc08fc1697652e2c59
-
SHA1
d5995e214b8abb0ae3a1dd016eb5d5b6761c17b1
-
SHA256
f3f2e6005283c3abd5b6ff2832476b5684df30167163608140d0e307b24fe6a7
-
SHA512
41a2ba59dc3853305a9087e9b934756700912fcbdeaf5400a863fdc78025ca55259d617faf958b1f768ec4c99996ef48effe523dba10d86c87c02459b86b0940
-
SSDEEP
1536:u+++pmkqUDPQzQR0e4IKdg3fMSb3PP0XRNCv7EuaiTRDnbbK2nLoGJHLeFLaN4:nBa2LtHSLaN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3a1f83b75779fcfc08fc1697652e2c59_JaffaCakes118.xls windows office2003