Behavioral task
behavioral1
Sample
128a2d6105360896238515c941c67f88_JaffaCakes118.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
128a2d6105360896238515c941c67f88_JaffaCakes118.xls
Resource
win10v2004-20240611-en
General
-
Target
128a2d6105360896238515c941c67f88_JaffaCakes118
-
Size
67KB
-
MD5
128a2d6105360896238515c941c67f88
-
SHA1
b602a512b58a089d5b2df45cd43f778e811a9b83
-
SHA256
4648edc370e61a52c95d3f525391e0154406fd661d01d091f2d9dba9f8a485f2
-
SHA512
e4aae27a4c03dcc9b68f6b7d99a277d4f5a960e8f34e9835b5685f68d872877a2a7d61f03fa27679ee584925eee34ba39f7fc4ea5f0266f26f608612fa2194d8
-
SSDEEP
1536:Gvyk3hbdlylKsgqopeJBWhZFGkE+cL2NdAIG7SPtKoSDu33ufGbD:kyk3hbdlylKsgqopeJBWhZFGkE+cL2ND
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
128a2d6105360896238515c941c67f88_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Module1
Sheet2