Behavioral task
behavioral1
Sample
5f489f6eef7e04857e865d1529ec6609_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f489f6eef7e04857e865d1529ec6609_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
5f489f6eef7e04857e865d1529ec6609_JaffaCakes118
-
Size
334KB
-
MD5
5f489f6eef7e04857e865d1529ec6609
-
SHA1
f3bb50e539acd34bccc3a3bb82eaa20c6e714ca9
-
SHA256
f3e4f9b513d7d25bf0a9eef94f585f1cf5642faddfa97b65e666a3ea4d09da4f
-
SHA512
6bcead41c6d5fe01fe9d04d33f7629f7f74275bdeda74aaec5cc5198380ff07a7bfb5c1fdf58cb049ca379a389a9a4caa3b0fc095e889e3fa7d8a6f7a87295ab
-
SSDEEP
6144:ss81Fz43UAC+6d8zYEGb6Fk3hOdsylKlgryzc4bNhZF+E+W/gELBAjH+3SQS4HBV:J3UA+d8rGb6cWjehS4Hj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5f489f6eef7e04857e865d1529ec6609_JaffaCakes118.xls windows office2003
l1
bb
Module1
UserForm1
Module2