Behavioral task
behavioral1
Sample
0c0f21c506d74e2d8cc73b6414d57001_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c0f21c506d74e2d8cc73b6414d57001_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
0c0f21c506d74e2d8cc73b6414d57001_JaffaCakes118
-
Size
86KB
-
MD5
0c0f21c506d74e2d8cc73b6414d57001
-
SHA1
d4a44f8634a7e96ab889d5666c3779c419e1c6af
-
SHA256
9dbf6590eb3207fcb07538621eb7166800514cb5f307ea35fea88cbe93c8e368
-
SHA512
6f9cd4100da3d7a9741438b1445ef6f95ecba6f090f202d56f17313c8b8f9cd16d709270d0176ca685be767880cd1a5ac72ddca033479a39b640c3c9aa3273a4
-
SSDEEP
1536:lptJlmrJpmxlRw99NBD/t+alqtmmBZ/tiwp613rvDaHwwle:bte2dw99fD/Lqtm8Vp6laT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0c0f21c506d74e2d8cc73b6414d57001_JaffaCakes118.doc windows office2003
znLKzJzoudlYA
ApWzUKnRosNSQ
YBEISfwZXXh