Behavioral task
behavioral1
Sample
af3a2a3acffb10d9390730edd34dadfe_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
af3a2a3acffb10d9390730edd34dadfe_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
af3a2a3acffb10d9390730edd34dadfe_JaffaCakes118
-
Size
128KB
-
MD5
af3a2a3acffb10d9390730edd34dadfe
-
SHA1
7fa7c8229fe73612f630b5aba6cfad2fd19ce6ae
-
SHA256
ac6a40c3083de464073c36c86a1f09183ef001bf4322f1034b37316382355f91
-
SHA512
13aab429c97b4c021d2d8ecd895a59fac23969ba674fbf03a9ea3def00b761a9c9886c7029e2499ed5798e9f1c5f0be90c1abeb0134e7941854c360f3d686d19
-
SSDEEP
3072:hhdvxHlcaAy0iWYOcG4BDhnxD7oOEYxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAHK5:zdvxHlcaAy0iWYOcG4BDhnxD7oOEYxEI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
af3a2a3acffb10d9390730edd34dadfe_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
Module1