Behavioral task
behavioral1
Sample
df5926ad349dad39884d0a71f8c7318b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df5926ad349dad39884d0a71f8c7318b_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
df5926ad349dad39884d0a71f8c7318b_JaffaCakes118
-
Size
534KB
-
MD5
df5926ad349dad39884d0a71f8c7318b
-
SHA1
de672dfb061f7f0d62940800f60ea963dc3cce3b
-
SHA256
6f67beb15edea5f47a2ca655bca9a534e5944e3704a916a2b3d00ed7790e25f0
-
SHA512
98ecd2118850fa1ce7c50554e434a7f7580926d7972abe5ca7a9a6a32d5b5771b598bbab0c7dd49a96157dff7d5451e41249d095d5664b63a72cef14ebc95b3a
-
SSDEEP
12288:o8CmEKY7gpWMB7goM6scG2u302l0HwbsG7kWunEDXm/zjHcB7:o8CmEj6B7pMDn2u3049HSn+Xm/E
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
df5926ad349dad39884d0a71f8c7318b_JaffaCakes118.doc windows office2003
ThisDocument
Module1
Module3
Module123345
Module2