Behavioral task
behavioral1
Sample
7c237ddb779bfff554d0413fb56c4152_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c237ddb779bfff554d0413fb56c4152_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
7c237ddb779bfff554d0413fb56c4152_JaffaCakes118
-
Size
406KB
-
MD5
7c237ddb779bfff554d0413fb56c4152
-
SHA1
489cd613d3bc930a68b06fac9997587ceb368000
-
SHA256
f7e7f6f6f70b3303f36882b0c609d5315978ddfd7f7c7633650ba7727f67991e
-
SHA512
2f70c50135d626d816bcc322904ef36b2d8488282f503eaa545f723caf8b55ef6f562dcc4a27945a4190c2eaeb6a784accae0c4e8a399923fe31c5b96c4b1fe0
-
SSDEEP
6144:REb2UrRuNijo+o/Q6zep2zQYtIRiq5QCXnIbc48uFEHe1qtLl6MzHLv7:Cb2UtuQkfQ662UFz5QC4bc4O0qZLv7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7c237ddb779bfff554d0413fb56c4152_JaffaCakes118.xls windows office2003