Behavioral task
behavioral1
Sample
4cbd18ecf3f934d6a8db9c3fe9245f81_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4cbd18ecf3f934d6a8db9c3fe9245f81_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
4cbd18ecf3f934d6a8db9c3fe9245f81_JaffaCakes118
-
Size
534KB
-
MD5
4cbd18ecf3f934d6a8db9c3fe9245f81
-
SHA1
c9bae2c8ce062ad9ba0495bbce6983824bb950e8
-
SHA256
4984ec3568630ce614a2296bd459f96f66f9fb935c3f0f89118e0c8a9bb6cdc8
-
SHA512
6045af24b187aba4c67f8629d2809a6f9a9d2bb13439ca35ff95c6471b4ea0ae282717a1ac684fe9392f9b95b232aa35f0dd4e58e972883413b0ec6ea87c6562
-
SSDEEP
12288:a8CmEKY7gpWMBbxoM6scG2u302l0HwbsG7kWunEDXm/zjH8BV:a8CmEj6BbOMDn2u3049HSn+Xm/y
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4cbd18ecf3f934d6a8db9c3fe9245f81_JaffaCakes118.doc windows office2003
ThisDocument
Module1
Module3
Module123345
Module2