Behavioral task
behavioral1
Sample
25abcb13b6d578c5e08cc8d9a15e4081_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25abcb13b6d578c5e08cc8d9a15e4081_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
25abcb13b6d578c5e08cc8d9a15e4081_JaffaCakes118
-
Size
44KB
-
MD5
25abcb13b6d578c5e08cc8d9a15e4081
-
SHA1
f24a53769ad8a8a5ade147191551217f5559ef9a
-
SHA256
9ee83ec90bf22d2380a9550421bf4e44881dd95f1f37ec243f71346539763a9a
-
SHA512
d4ea2fe7d77008d1556aa645eb22693f6d7e7dba015cd3ecd691eee71813930e3ba899ed397ad535b7f88b7216d7934df1c0cee858375862bf516488518ac75c
-
SSDEEP
384:wqM8iSUR/8dAZZqNLi08kr9uHzQjbuMZZzkExygcPEdEsKhb2YOPygBP0jd5ti3:W/qAaLiEnbZZ19yhEd6yPJNy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
25abcb13b6d578c5e08cc8d9a15e4081_JaffaCakes118.doc windows office2003
ThisDocument