Behavioral task
behavioral1
Sample
895243f8845295a9b4d9a606a6590f5f_JaffaCakes118.xls
Resource
win7-20240729-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
895243f8845295a9b4d9a606a6590f5f_JaffaCakes118.xls
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
895243f8845295a9b4d9a606a6590f5f_JaffaCakes118
-
Size
40KB
-
MD5
895243f8845295a9b4d9a606a6590f5f
-
SHA1
1c0afde6cdfe7bb866f4a593861e4de9f03d0bac
-
SHA256
d34c85f08a66a49a4d2019567df972f0ca4c9f6b4e0f5de0c7aba58af2aff48a
-
SHA512
8e9b694e039e6f11d651b28256c44caa34088a85c6536cc13a2e8e67eb6cc8cd8e34a717ef0f080fc83ab5c52f0ac58c59ff1e41addab6e9caef270678ffb061
-
SSDEEP
768:XBjSZCP7UGFR0Rl6QZEgFlVC6HlpMGnT98hzW95ODYb:XZP78c4lrPHPnhdODY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
895243f8845295a9b4d9a606a6590f5f_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
LzO