Behavioral task
behavioral1
Sample
09aca1b6b096fb40bf8bb3aa59ff68b8_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09aca1b6b096fb40bf8bb3aa59ff68b8_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
09aca1b6b096fb40bf8bb3aa59ff68b8_JaffaCakes118
-
Size
76KB
-
MD5
09aca1b6b096fb40bf8bb3aa59ff68b8
-
SHA1
db1f90d54ae835b2afedc626aa2a843545412300
-
SHA256
46c708f3468052469785a18c61440521d05eeeb48625122b2f0879924fcf19a2
-
SHA512
8318a55b9c166d6bfa47ef2167e1bd84630ac28f953d57283c9cbf7ea206c70837d8ad69d4c120343425b521cab5ec12037d3b5127aa55abd5a7520e69cf1c57
-
SSDEEP
768:tNVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBb+1ornJR31jvdm6K064iAOEC:tNocn1kp59gxBK85fBb+ar9vU6DHdC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
09aca1b6b096fb40bf8bb3aa59ff68b8_JaffaCakes118.doc windows office2003
GaLTbMhr