Behavioral task
behavioral1
Sample
c1ec9da1267f27c493c89b6c63fa78be_JaffaCakes118.xls
Resource
win7-20240704-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1ec9da1267f27c493c89b6c63fa78be_JaffaCakes118.xls
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
c1ec9da1267f27c493c89b6c63fa78be_JaffaCakes118
-
Size
44KB
-
MD5
c1ec9da1267f27c493c89b6c63fa78be
-
SHA1
f6366eada62cceb055120b3f57bafb9c6f7c1662
-
SHA256
1f987e719f1e1dd8c3d4d8401efd3223b1ab253f05de6294f0dcbfa07d9c6d6d
-
SHA512
d1da601408806890a08e2e7f2e4f0c64c2d39c8b89719340f31e959f2d2e4fe3c16e70c328200c9a98fd7bee3ee0f6d9aa7b8e97c9cf2c1389e9a6b298e31289
-
SSDEEP
768:HeeeeqUR2ay3iwMuS7jDyCHgAvupJSFIro6iq7kMu:HeeeeqG7jmdoMr34
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource yara_rule sample office_xlm_macros
Files
-
c1ec9da1267f27c493c89b6c63fa78be_JaffaCakes118.xls .vbs windows office2003 polyglot