Behavioral task
behavioral1
Sample
6b8ba0608e180d21c6a6a1211767308e_JaffaCakes118.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6b8ba0608e180d21c6a6a1211767308e_JaffaCakes118.xls
Resource
win10v2004-20240709-en
General
-
Target
6b8ba0608e180d21c6a6a1211767308e_JaffaCakes118
-
Size
25KB
-
MD5
6b8ba0608e180d21c6a6a1211767308e
-
SHA1
ab851257b0128cbe9416ec86fc22c6b7b5121e66
-
SHA256
f70cec7467c9a84306e788e0455391c7c4126bd51afb8290599fe28bfc9b233a
-
SHA512
3386d186fffb2f781edd1fd8958d1faf7a9702569092c4b8af3eba30e795e9e7935c5e916615e7e28cdabdf8286b8fcd6ce86c85c9bf85abea452c43e1b89f58
-
SSDEEP
384:X6M6v1us6Zz+4+9WBE/FzKdz1MdhsK/gpdbE2dymeeUyg:KM6v1uhZz+4+e8s2DIpddzg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6b8ba0608e180d21c6a6a1211767308e_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet17