Behavioral task
behavioral1
Sample
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118
-
Size
65KB
-
MD5
0413f92d3b2f6300a0ed5d6d362ef09c
-
SHA1
e0ed8f26783e15a4fcc44b13997912295dc52bad
-
SHA256
58c6de98959ad1e8fa0c907b8132e557f516944676936af659f6c80b1ac2804e
-
SHA512
20ae21f5f8456c4cbb3a294f54aaf4c2ab7330a2d994f91eee7ac2f1a56b08697821af3158f3050d37878b166d8a9930ba12ccefb2f9339c87b921acef952388
-
SSDEEP
768:cpJcaUitGAlmrJpmxlzC+w99NBz+1o80cZBv0fNNfw/i9m57MI2:cptJlmrJpmxlRw99NBz+a8vBi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc windows office2003
DBKDWFuIhNwzVw
HJXWrpqHU