Behavioral task
behavioral1
Sample
JaffaCakes118_991f8ff597aefccc818bb59c85c071f8.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_991f8ff597aefccc818bb59c85c071f8.xls
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_991f8ff597aefccc818bb59c85c071f8
-
Size
421KB
-
MD5
991f8ff597aefccc818bb59c85c071f8
-
SHA1
02fcc151becfde62a3820388d09107bea49536fa
-
SHA256
32adc96312da6a28d0e8e63bb55f0bc958255c504999b74ca510d3d041b3d58c
-
SHA512
a84a0b7570af517918531e48dcd86078407f7f790134ff61335e9fda5614774062eeac1f3bdfb142ae18261f16e2858be22282a4627d3e1f8360dcdae71735ca
-
SSDEEP
3072:xrFjzrlsls52hd7rAIUSVejNdrHCx71Yc47vLGvgWCXHnmJbt9Sd28RgMmRwE1pL:xKb8nSVejCZv49pHnmJ+3Xmq0pK+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
JaffaCakes118_991f8ff597aefccc818bb59c85c071f8.xls windows office2003