Behavioral task
behavioral1
Sample
2bb929d2b6473f1f0aef8062a2bfd7ec_JaffaCakes118.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2bb929d2b6473f1f0aef8062a2bfd7ec_JaffaCakes118.xls
Resource
win10v2004-20240704-en
General
-
Target
2bb929d2b6473f1f0aef8062a2bfd7ec_JaffaCakes118
-
Size
129KB
-
MD5
2bb929d2b6473f1f0aef8062a2bfd7ec
-
SHA1
4cb7a592da48d1761a329a23fb2ea8d3c5cc2d98
-
SHA256
b870411bb9f5afa36e27c1ced75f86a6109b33d8969ddb064cf08b5a07a05ec7
-
SHA512
aca23e80025db1142e30e32f0248f8129623e09bd7ff4535170b11c4ca587792eaef236b4e44913a70b5e4398ef6205aaf8c0286f4d4a986bb352a7823b4d47b
-
SSDEEP
3072:Dk3hOdsylKlgxopeiBNhZFGzE+cL2kdAXc6YehWfGLtUHKGDbpmsiiYu6o6C06vK:Dk3hOdsylKlgxopeiBNhZF+E+W2kdAXp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2bb929d2b6473f1f0aef8062a2bfd7ec_JaffaCakes118.xls windows office2003