Behavioral task
behavioral1
Sample
d6a9edfd6995ab7c8a84ce70178ea18c_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6a9edfd6995ab7c8a84ce70178ea18c_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
d6a9edfd6995ab7c8a84ce70178ea18c_JaffaCakes118
-
Size
67KB
-
MD5
d6a9edfd6995ab7c8a84ce70178ea18c
-
SHA1
e3ec93b8e8cfc7e7aef66664e4e83299502c8922
-
SHA256
e29c0b9659bc6f4af1bb148c79c4badd043f6c731722c0e9c568093afb679d10
-
SHA512
eceaa6daa296d71a281a99ddcc0b1cad84475677f14ed4ee2d348207ea11784ec3a46b490795d311542b2fc9c78f79c4964a7d203eefffa7f6799be9a2f79a9b
-
SSDEEP
1536:VF35Ht0SwPasau4mU+4pL5n5LZImZqY35qAOJl/YrLYz+WrNhZFGzE+cL2RnAeaM:VF35Ht0Sgasau4mU+4pL5n5LZImZqY3x
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
d6a9edfd6995ab7c8a84ce70178ea18c_JaffaCakes118.xls .vbs windows office2003 polyglot