Behavioral task
behavioral1
Sample
9b8ca6d79745b959267e99b88da6055e_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9b8ca6d79745b959267e99b88da6055e_JaffaCakes118.xls
Resource
win10v2004-20240426-en
General
-
Target
9b8ca6d79745b959267e99b88da6055e_JaffaCakes118
-
Size
289KB
-
MD5
9b8ca6d79745b959267e99b88da6055e
-
SHA1
d9458e8d846c76e669c37522a0307cf20bd9cb78
-
SHA256
c46147373226c647da4644f5f8ed2bcf1d3db7de72ce1af47fdd94fb39c2b582
-
SHA512
575df1525dc58acc7d46ad91bcf2630f2ce5d39fb07e9657e6eda7d7bc3020f9460d39156c13e00cd5ce1a6fada25190024f7eba3f2975ee593d5365a730fafe
-
SSDEEP
6144:u7uDphYHceXVhca+fMHLty/xclrdgcBMSTmY8PJ3VMEbynzFcA25tdzsx9vA:AmDnqxcA25tdAx9vA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9b8ca6d79745b959267e99b88da6055e_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
UserForm1
Модуль1
modBarcode
frmConnect
clINI
modSelectFolder
frmParams