Behavioral task
behavioral1
Sample
200f08297cc9faefc5ea695ba65e90a9_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
200f08297cc9faefc5ea695ba65e90a9_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
200f08297cc9faefc5ea695ba65e90a9_JaffaCakes118
-
Size
89KB
-
MD5
200f08297cc9faefc5ea695ba65e90a9
-
SHA1
f971df29a33cdbdf65cb776bc947e1f28f6d6e5e
-
SHA256
c555b4b4df8721a2d969f375d8f5fa7deba2f76dc03f32de4c5b1a8515efb02b
-
SHA512
aca15b6f4d4a4fdf564e9457867241e5af3cb9656e148cbf2f4f1eaf7cc516f4bed6f0badfbf53651cf8c05ecdb098f200a6b3ab29a048a51c2c9890b8c47a6f
-
SSDEEP
1536:lptJlmrJpmxlRw99NBD/t+alqtmmFZ/tiwp613rvDaHwwle:bte2dw99fD/LqtmQVp6laT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
200f08297cc9faefc5ea695ba65e90a9_JaffaCakes118.doc windows office2003
znLKzJzoudlYA
ApWzUKnRosNSQ
YBEISfwZXXh