Behavioral task
behavioral1
Sample
26db2e9edbf5cfe7a96184af05eeb7a4_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
26db2e9edbf5cfe7a96184af05eeb7a4_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
26db2e9edbf5cfe7a96184af05eeb7a4_JaffaCakes118
-
Size
113KB
-
MD5
26db2e9edbf5cfe7a96184af05eeb7a4
-
SHA1
9bdef64948225e353b119bff09767d47c1928e89
-
SHA256
1ee03ea88b5a75399294f60c87f3464d186dd6229938d0d3acdba45e265cc5e9
-
SHA512
a3f0edf06312feabb3a0e7f18c27ec0ca869de0d9def813abd1ed72d026e8e5fa32839d5287802630da3b9bbb6a0d110cf31f3aa3233711a343b6a0ce47166ec
-
SSDEEP
1536:pY4xBSORCc0LD+agIomWmE/Nqc8C/HitYUgGuLKJuxmy53HKZX2Bqdgh0MXTX9YY:DBSOAdLtBWMwLQMmyI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
26db2e9edbf5cfe7a96184af05eeb7a4_JaffaCakes118.doc windows office2003
VzWoimVZKbolW
ElECzWfsNkKwQ
LjiXKIhqljHq