Behavioral task
behavioral1
Sample
d3f3308f5d247f0b9383df6cc40b58f9_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f3308f5d247f0b9383df6cc40b58f9_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
d3f3308f5d247f0b9383df6cc40b58f9_JaffaCakes118
-
Size
72KB
-
MD5
d3f3308f5d247f0b9383df6cc40b58f9
-
SHA1
ca9a58dab1edf8f57c057c8dafdab558f42d4aa0
-
SHA256
4d7ecd6a5b222c198d156bc12142f364c918a971c64fe7d8d9adb474343e2bf5
-
SHA512
40fff2b94293ee1533fcb3edf6b8b8b9d3d6f262c77a6ba323422f26590cb8e1ed1a3f1c99d4fecfa30d30818e424608b0fc82dd366a9f7c1d075cf7f0531038
-
SSDEEP
1536:n1ppppc0oFBtNx/0+C6rLsb/Agprja9pAssqIBgr9Pg/2Mrbz4jpL15Q6A22YPAm:VCe2Mrbz4jpL3Q82XsJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
d3f3308f5d247f0b9383df6cc40b58f9_JaffaCakes118.xls windows office2003