Behavioral task
behavioral1
Sample
68b97c3e108463e751f30fbf565fcf50_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68b97c3e108463e751f30fbf565fcf50_JaffaCakes118.xls
Resource
win10v2004-20240426-en
General
-
Target
68b97c3e108463e751f30fbf565fcf50_JaffaCakes118
-
Size
45KB
-
MD5
68b97c3e108463e751f30fbf565fcf50
-
SHA1
0913d4e8a87f7038d592c3b8c2701c879eec931e
-
SHA256
7fd514e9bbd7e39c78aa80be382d5cfd7d0ed47dd6bcc74a2ab7fdd670d51261
-
SHA512
f4c866fb6c8f27b292fc3cac856b6fd72781fb264298401979fab788a175292aee9d8273cdf4921f9db911d08fe554f6657de45886e4de44cdde63ced793d187
-
SSDEEP
768:Rwn1DN3aMePUKc1/pnVvjJTdrBZq8lLk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJQ:Rwn1DN3aMePUKc1/pnVvjJTdrBZq8lLk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
68b97c3e108463e751f30fbf565fcf50_JaffaCakes118.xls .ps1 windows office2003 polyglot
ThisWorkbook
Sheet1
Sheet2