Behavioral task
behavioral1
Sample
0a8c1f35ebf0f55a44628e91cd7e9fbb_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a8c1f35ebf0f55a44628e91cd7e9fbb_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0a8c1f35ebf0f55a44628e91cd7e9fbb_JaffaCakes118
-
Size
124KB
-
MD5
0a8c1f35ebf0f55a44628e91cd7e9fbb
-
SHA1
d3329276fea11a5dc60e3bd14c810bdbe19833d8
-
SHA256
2374dbfc77a0b14843a75e4f8358aa6b0c6b96482fd4231639194ee310cea943
-
SHA512
503424c8f151cd4a136947fa19909d795bd7ac2a353ad22bc0c60625bc25264452d45f3ff78ca32b76397a4dae128258fdb12969dc528d2c33a6328154e29670
-
SSDEEP
3072:qte2dw99fe/7yjQJj5Q6UpEjVAbRjaKnjRTK5q2G+iBm:yHdw7eejQJj5Q6UGjVAbRjaKnjRTKoYH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0a8c1f35ebf0f55a44628e91cd7e9fbb_JaffaCakes118.doc windows office2003
ikXVjZibrS
BGomjwOUnNj
LwbUDtwvnip