Behavioral task
behavioral1
Sample
d9cb39d72fb5c4892be55faa6116b892_JaffaCakes118.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9cb39d72fb5c4892be55faa6116b892_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
d9cb39d72fb5c4892be55faa6116b892_JaffaCakes118
-
Size
48KB
-
MD5
d9cb39d72fb5c4892be55faa6116b892
-
SHA1
c2496f5e2b18a44ba8b46ad58354966080ae993e
-
SHA256
4dcd6b3670aedab1c10e5af8c867b9bcc4785f2ee26bd1b174f927846e92c84d
-
SHA512
4d02a351ff449d8e8a8b65a933124710069b7435268eff2360a2f4d3cb627df40de8ff35a3ebcb3a4321e55eeae39241af77f2e40eece214e6a84b04589faf16
-
SSDEEP
768:/8Q2OFxEtjPOtioVjDGUU1qfDlaGGx+cL/IEORqEkek7E5wsJMFdTm23Bo:/nxEtjPOtioVjDGUU1qfDlaGGx+cL/Id
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d9cb39d72fb5c4892be55faa6116b892_JaffaCakes118.xls windows office2003
ThisWorkbook
Sheet1