Behavioral task
behavioral1
Sample
aa414a03d8da2bd7723c97e6c377a836_JaffaCakes118.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa414a03d8da2bd7723c97e6c377a836_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
aa414a03d8da2bd7723c97e6c377a836_JaffaCakes118
-
Size
129KB
-
MD5
aa414a03d8da2bd7723c97e6c377a836
-
SHA1
65e0ff1d8412d4bf84a4fde210bc24594096831a
-
SHA256
d1755df7be47bc3aae7f163f3a889f577175f6623b71dca5eb8d8d8fd2ea8cdb
-
SHA512
56154eb4224fcdab5ff48d216088b39cfb30d3542253c223be8893f201585fdd9281791e949bbddec550319b8ec85489dd2485730afa086df9ffa4663b2b4cd5
-
SSDEEP
3072:Sk3hOdsylKlgxopeiBNhZFGzE+cL2kdAxc6YehWfGdtUHKGDbpmsii/+u6ssC06+:Sk3hOdsylKlgxopeiBNhZF+E+W2kdAxX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
aa414a03d8da2bd7723c97e6c377a836_JaffaCakes118.xls windows office2003