Behavioral task
behavioral1
Sample
5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls
Resource
win7-20240704-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118
-
Size
428KB
-
MD5
5158c5c17862225a86c8a4f36f054ae2
-
SHA1
6da27200f473f8c55bb125f68314eecb2219c3dd
-
SHA256
b29691ac40b8bbb12b13e84641ad20583d1387ca356850aa7b5e76b0f6c76806
-
SHA512
c006f8ce77ef7dc150f137bb876a31e8f62f58e8337f487bab17752aa9eea95070e78b791488f36a2d152a871533a8bb9ee601f0053d1a2256d9e3cec3e7fe75
-
SSDEEP
6144:LxEtjPOtioVjDGUU1qfDlavx+W2QnAHBM:B
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
Module1
userForm