Behavioral task
behavioral1
Sample
cff12cf815ba1c9b5dcc65baafa52e38_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cff12cf815ba1c9b5dcc65baafa52e38_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
cff12cf815ba1c9b5dcc65baafa52e38_JaffaCakes118
-
Size
70KB
-
MD5
cff12cf815ba1c9b5dcc65baafa52e38
-
SHA1
43ad6336b9d7868373ec53202122a1e6c3bfe4c9
-
SHA256
fb42713cea74ad7a0d4579b86d6c213b25b1f8594019787da3f2152e436fd8fd
-
SHA512
35b5b328bcdb59d7a50f3c8f3ecc32b473ab6865292af19c608e0f88bea36a60797a7304676b39c193f1da27aa23bcbfd10ea4c10074c330c0d11e377504a4a6
-
SSDEEP
1536:ZAk3hOdsylKlgxopeiBNhZFGzE+cL2kdAFx7vof2cDSI0Va7l86GZ47m:Wk3hOdsylKlgxopeiBNhZFGzE+cL2kde
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cff12cf815ba1c9b5dcc65baafa52e38_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1