Behavioral task
behavioral1
Sample
2cc0b7a0b4fc9fd1b0d0d81aaf32781e_JaffaCakes118.xls
Resource
win7-20240705-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cc0b7a0b4fc9fd1b0d0d81aaf32781e_JaffaCakes118.xls
Resource
win10v2004-20240704-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2cc0b7a0b4fc9fd1b0d0d81aaf32781e_JaffaCakes118
-
Size
37KB
-
MD5
2cc0b7a0b4fc9fd1b0d0d81aaf32781e
-
SHA1
201c1422c9e1a9ed422205203653ebd2482823c7
-
SHA256
17d1aed2d38da5a24afe9730f941eb2daa7bb845686c4c25a26e28d53aaf9144
-
SHA512
6d3780010fb71321dbd61297cd15fcce8cae03a9d1ab48fba0eaf074e03033753ec4dc6329f8f6b41d677d3ffd1730d82bdcb28f170635cbe86a88f50f7a91d1
-
SSDEEP
384:jjGuNvqQxK3O/8QD6gC3gnLIYGFUaVLkC05+/T58e:fGuNvqQxFYHY3L+
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2cc0b7a0b4fc9fd1b0d0d81aaf32781e_JaffaCakes118.xls windows office2003
ThisWorkbook
Hoja1
Hoja2
Hoja3