Behavioral task
behavioral1
Sample
bdc928e2064faf3950aef955c1c9fa8c_JaffaCakes118.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bdc928e2064faf3950aef955c1c9fa8c_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
bdc928e2064faf3950aef955c1c9fa8c_JaffaCakes118
-
Size
57KB
-
MD5
bdc928e2064faf3950aef955c1c9fa8c
-
SHA1
9f9d41aabb5e58d765f5ff4d930e6dab5fa2a613
-
SHA256
2f00e0bb89d863ee7834ae9cb69d98f8e826e6d328fcdd833d91d62634f675ce
-
SHA512
56aaead60a09d038afe2e8bcd862d9756649000831ad68e60e448054235aadb645c8549844fd47c099279f98437f446d83f1418ab384f91d98ec603758606d0b
-
SSDEEP
1536:p7/dvxHlcaQPy0iWYOcG4BDhnxD7oOEmY35NAYJl/OruYz+zrWhZFGkE+cL23nAC:pLdvxHlcaAy0iWYOcG4BDhnxD7oOEmY4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bdc928e2064faf3950aef955c1c9fa8c_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1
Form1
Module1