Behavioral task
behavioral1
Sample
JaffaCakes118_8d938b2f2ba46ed3d82f5cbc52da35be.xls
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
JaffaCakes118_8d938b2f2ba46ed3d82f5cbc52da35be.xls
Resource
win10v2004-20250314-en
7 signatures
150 seconds
General
-
Target
JaffaCakes118_8d938b2f2ba46ed3d82f5cbc52da35be
-
Size
44KB
-
MD5
8d938b2f2ba46ed3d82f5cbc52da35be
-
SHA1
e7ad11bfa000f82f818a536d5dfacc66c7146257
-
SHA256
220e19519e204c15d2ac8b39155e37d6775d73c131e3f339942b68d4547239d5
-
SHA512
a0af76076a7ce006f4632751b69efa3224597be803362dafbc6dea89cae848744a0ca7b1b8c3671429e81aa4cd0345b8ea1681493f5967f203c4d87bd5281d9c
-
SSDEEP
768:DTBI18WsJZayox5tWTDGCEJb0tx+MZl1AVS:DVy8WsJgyLCYlsS
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
JaffaCakes118_8d938b2f2ba46ed3d82f5cbc52da35be.xls windows office2003