Behavioral task
behavioral1
Sample
1ee8339c87b2621e5d15aa6f3951a5d2_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ee8339c87b2621e5d15aa6f3951a5d2_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
1ee8339c87b2621e5d15aa6f3951a5d2_JaffaCakes118
-
Size
49KB
-
MD5
1ee8339c87b2621e5d15aa6f3951a5d2
-
SHA1
1d0f55ae151e2ec7ecf75e81502cdd41a4149fbd
-
SHA256
eff392eb61fb27402cf2c5b897678f6d3d05c03e0ecdf2726da451a3526ff38c
-
SHA512
82046274a480f8a5c03d30a6866467f09d8505785549dfa8a5104b974814e447162665281958d1b5a905a1c6d7313f760e8357f5480ea67db5d14fae4cc496ab
-
SSDEEP
384:wlxiSdJ7UAygbrQbsnxzY/Yr4qe6rMbQ/X9O1cckiEAYFXGxAB60j8Etj:qJgGb0bgx+Y8yt/MFEAwsr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1ee8339c87b2621e5d15aa6f3951a5d2_JaffaCakes118.doc windows office2003
ThisDocument