Behavioral task
behavioral1
Sample
1018edcc355eff9f0a4de86e2d3370b2_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1018edcc355eff9f0a4de86e2d3370b2_JaffaCakes118.xls
Resource
win10v2004-20240611-en
General
-
Target
1018edcc355eff9f0a4de86e2d3370b2_JaffaCakes118
-
Size
35KB
-
MD5
1018edcc355eff9f0a4de86e2d3370b2
-
SHA1
95e823401da426bcd7592bbf71a491918dbbdb74
-
SHA256
1d2ee6d80babc57368a251a92e93779442578a1f4295c0e4d4a83553e15c72db
-
SHA512
0afb1fa9df5673ace639af1f6c0afa0c43cfd6686eaec2b8db3e6d49ac018f9fd5fc8508f04f35af032b337fa4128d1570457b8ec45a007e655f1e04a1a318ec
-
SSDEEP
768:emk3hOdsylKlgxopeiBNhZFGzE+cL2kdAJpZ6FLQNs+1MykfsbwmcCX:zk3hOdsylKlgxopeiBNhZFGzE+cL2kdm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1018edcc355eff9f0a4de86e2d3370b2_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1