Behavioral task
behavioral1
Sample
a5d9d8b01d6495e8ab00b5065023eb3e_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a5d9d8b01d6495e8ab00b5065023eb3e_JaffaCakes118.xls
Resource
win10v2004-20240611-en
General
-
Target
a5d9d8b01d6495e8ab00b5065023eb3e_JaffaCakes118
-
Size
77KB
-
MD5
a5d9d8b01d6495e8ab00b5065023eb3e
-
SHA1
bf22d3c947b2a61cbffbf9d4aa8c652bdf675252
-
SHA256
828f5236e64843931d83676177a8961b58d5a8de8678da215366777f3ed0b57e
-
SHA512
0b65a4e958542be002b01d137eec62928244a58a0427313319077959c339b5fae072a20e9aed9ab7766e423cd17e0dde3bc623269acd3a30ec9d235f7de8e52c
-
SSDEEP
1536:o5xEtjPOtioVjDGUU1qfDlaGGx+cLYIxQxP4IVdpAIaMV:o5xEtjPOtioVjDGUU1qfDlaGGx+cLYI9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a5d9d8b01d6495e8ab00b5065023eb3e_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1