Behavioral task
behavioral1
Sample
7bacc5889dece0aeaa48edce3b787d94_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7bacc5889dece0aeaa48edce3b787d94_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
7bacc5889dece0aeaa48edce3b787d94_JaffaCakes118
-
Size
590KB
-
MD5
7bacc5889dece0aeaa48edce3b787d94
-
SHA1
aa5fbddb20358b2e561779a5320fcca4de9e3883
-
SHA256
26bf24bda2dc0cff0da866d202f339a3786e9d1283f3741409cff454047b74f1
-
SHA512
e7c023ad0657075b3e51fb29a3f5b3915a7a3bfe8ff3bacc8050896d7c3158cf6bfa72433160ed51c25cb224c27457ee3fc9bec9a8de5601ef8ad4d3d62fcec7
-
SSDEEP
12288:16zQxKOcLWfPPNYhAQA7GYhGfpU+nhY/9MbcpZwnXEJ1fFrQmBC0fy3IFhsoE4St:1CndLiXNYhAQA7GYh0pFhY/9MbcpZwnZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7bacc5889dece0aeaa48edce3b787d94_JaffaCakes118.xls windows office2003