Behavioral task
behavioral1
Sample
143e45e1c63349c1e2f8a109f30feb9a_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
143e45e1c63349c1e2f8a109f30feb9a_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
143e45e1c63349c1e2f8a109f30feb9a_JaffaCakes118
-
Size
140KB
-
MD5
143e45e1c63349c1e2f8a109f30feb9a
-
SHA1
7edd3707fd4c6a31c3223c5606819a636cb0d53d
-
SHA256
0a14cb61f5f8d1f7bd9a825d25fc6d2d09699b20b4d53b9b06fa46c4eb22ddeb
-
SHA512
73daa6c900aff8d50f8fcfea6b61c23344b439e15c19d87e39c1f0c4590fe0841d0dbf204c72f1676e8268f282d6efabbf498c1091543076a3ae54d1993b69a8
-
SSDEEP
3072:wTTTTTcn/iKFUrx0o7t8qIzG1PRfEluu6qToxZYP2CH2w+X/r5pEG5nY:wTTTTTc/iQ2x0uCqgGDfr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
143e45e1c63349c1e2f8a109f30feb9a_JaffaCakes118.doc windows office2003
ThisDocument
DNGhKTqMjkB
GUwhPFbhohYwpl
PpkmwMdbtv
LBwcVFWPUlXLs