Behavioral task
behavioral1
Sample
d1c9738caa965e0639928af06682636c_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1c9738caa965e0639928af06682636c_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
d1c9738caa965e0639928af06682636c_JaffaCakes118
-
Size
30KB
-
MD5
d1c9738caa965e0639928af06682636c
-
SHA1
b0d4011761353e73992897f375295488d6330b31
-
SHA256
ab2442daa039359f05e9a34d901745795fb2e0e6beb4431e9cbb806c5671a268
-
SHA512
9500f67a8b691a33b4bd15b50fc0c1f60b2e87545a51ebed04a4e1808b2bcee745d06664bc380bbc7e67d773310fb1d1e088cccd115b18b2a49da2bc1f6e389d
-
SSDEEP
384:Sa1kHmEdgEJbXxTRDylz640y5fJpxGHYCT3lkF29wTTWxdMw+wRTwTMwZ5foqmyH:rbECEJbBTRDyAzsZ4Lx5tWTD1mu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d1c9738caa965e0639928af06682636c_JaffaCakes118.xls windows office2003