Behavioral task
behavioral1
Sample
420be14b330a7ea81787283f3cbccc63_JaffaCakes118.xls
Resource
win7-20240508-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
420be14b330a7ea81787283f3cbccc63_JaffaCakes118.xls
Resource
win10v2004-20240426-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
420be14b330a7ea81787283f3cbccc63_JaffaCakes118
-
Size
543KB
-
MD5
420be14b330a7ea81787283f3cbccc63
-
SHA1
186998f83b36eb982df245edc10326a9a613eb8f
-
SHA256
58bcc4af36a01d9afa1651934c9cdadbbd98f61f4cace97f3977a3cc182cf840
-
SHA512
975287aa5a08e6ac935d0bf221b0d750991989805732a49ac4e3b4091211e7d018acefd135d3abf66582f3989dda9b866d05bee92aaaec627e595254134618e8
-
SSDEEP
12288:MQEk8+Kf1Toc+m/rxqKu6wq0QBMbf/Yqa8SAhHQ:F9StYq++8BHQ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
420be14b330a7ea81787283f3cbccc63_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1