Behavioral task
behavioral1
Sample
16f2f4622b6f912bf20194303db0da9d_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
16f2f4622b6f912bf20194303db0da9d_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
16f2f4622b6f912bf20194303db0da9d_JaffaCakes118
-
Size
1.3MB
-
MD5
16f2f4622b6f912bf20194303db0da9d
-
SHA1
574cc116fc3e27c861e1ee91a6f3fb2ea4848ec9
-
SHA256
181da298577ea0b4e5ee85e66fd484460650c8268f45cf6cb1746ff07474c624
-
SHA512
19c123196d7b1bc12c3088d0cb8ea52a33ff8b156d1878e5c9896463afb21bba19b91034623ea4f04477a991ee547ac79cb7dd1ee2bae12ab5cd07d9bc2c1f9d
-
SSDEEP
24576:1UQXqLLaQzalRiTSIVjRzyqp4yxNFrE9RvvkmmVXmUxvp6hGqmXeI7GzhW:uQMDzhur
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
16f2f4622b6f912bf20194303db0da9d_JaffaCakes118.xls windows office2003