Behavioral task
behavioral1
Sample
08a52ac7a5e6347e6cc87610c3b0e876_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08a52ac7a5e6347e6cc87610c3b0e876_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
08a52ac7a5e6347e6cc87610c3b0e876_JaffaCakes118
-
Size
129KB
-
MD5
08a52ac7a5e6347e6cc87610c3b0e876
-
SHA1
1bea6ea0f1e0831192f92b2af00a890e3dc72f2c
-
SHA256
1bb3621d040b2164851b2c5b0928912779170557d8fae44dd1aa3b6cc695db3e
-
SHA512
1f0013d3c2157e28772a7c28e65c6b482896ba8bbbf78e36caf150eead93ce359fd830800bbc24570aadd1ce72a88c25b0fd80bdb129697387906da9b77d5cde
-
SSDEEP
1536:9/SBnNg8keYNKZhNaKPdsmjEDF5jIDWI1puWZOZR/o9cQgWLbwvAuzMW04hszl:0BNgZWDNwb8i5WgZt5QhwYuoWhhsz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
08a52ac7a5e6347e6cc87610c3b0e876_JaffaCakes118.doc windows office2003
ThisDocument
tqnzMNi
sSPSZzRs
OWfobLHRFBTc
OdSzBiatn