Behavioral task
behavioral1
Sample
819f8db2188e1a3b9c7307aba04a4da1_JaffaCakes118.xls
Resource
win7-20240508-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
819f8db2188e1a3b9c7307aba04a4da1_JaffaCakes118.xls
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
819f8db2188e1a3b9c7307aba04a4da1_JaffaCakes118
-
Size
3.6MB
-
MD5
819f8db2188e1a3b9c7307aba04a4da1
-
SHA1
1f77bf8a9adba0b2db581114b1cb520cba871f5e
-
SHA256
f73373abf1d57ca27dfdb7a1b6ef510d726fabc6de8cc0096eaa88c65f526e8b
-
SHA512
872f18b497b412cbec999235810b0fee5f70bdde78ffad8d9ba1a993079302cefb0dbf571c9b29e339e8f2caac6e6aea8f059b6a5b1d569b905752455b8fd742
-
SSDEEP
24576:AVATCfBhXrS29N+xs5T+333onUZyoqe6n0kHrio:7CfBhXe4u33uToqe6n0kHrio
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
819f8db2188e1a3b9c7307aba04a4da1_JaffaCakes118.xls windows office2003
Лист1
Лист2
Лист3
Лист4
ЭтаКнига
Module1
Module2
Module3
Module4
Module5
ModulePrice1C