Behavioral task
behavioral1
Sample
ea2905d59e492c92e7997f1d9e1d3ae8_JaffaCakes118.xls
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ea2905d59e492c92e7997f1d9e1d3ae8_JaffaCakes118.xls
Resource
win10v2004-20240802-en
7 signatures
150 seconds
General
-
Target
ea2905d59e492c92e7997f1d9e1d3ae8_JaffaCakes118
-
Size
30KB
-
MD5
ea2905d59e492c92e7997f1d9e1d3ae8
-
SHA1
a38437c013ae830a59264473b4d6600f5d893110
-
SHA256
a8ea4ca8507f1958056a3121449689237d1dc1eaa3beb219ce94288030594c08
-
SHA512
f8b120a8cac3b6cb30a976d8659454642649aee9eb5985ea75d5025ce7645c97a65940ae22a7beae47a5a32aa4ee413d5561f8811e3bb907867c2121ea35098a
-
SSDEEP
768:eAaMUVgCEJbBTReyAzsZpLx5tWTD1WmwT:vU4ReyAzsZpMq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ea2905d59e492c92e7997f1d9e1d3ae8_JaffaCakes118.xls windows office2003