Behavioral task
behavioral1
Sample
269d71d42cd2e684c548cb4c67eafdee_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
269d71d42cd2e684c548cb4c67eafdee_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
269d71d42cd2e684c548cb4c67eafdee_JaffaCakes118
-
Size
208KB
-
MD5
269d71d42cd2e684c548cb4c67eafdee
-
SHA1
152f977042bf6f637484af13dac93503ab2b87c0
-
SHA256
8c74fec049097ab0d1ed276e534d2221a34700bf3cb05513a883456c62dfc0ee
-
SHA512
af0792fd93b78d7145f84a84d88db73baa2c216fde8747ed76059a2c51b03c6ead8b3860e3c46766478167c089d8c295ea0cd788a65f67dff004a3ef11db266f
-
SSDEEP
3072:Fte2dw99fdaN7EqSC/ZG3Fo3I4IKqzNdJHn0Qexv0jdsja7OMCbsUSW:3Hdw7kN75B/CF/TzNdJHnYOjOa7iwU3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
269d71d42cd2e684c548cb4c67eafdee_JaffaCakes118.doc windows office2003
jtTwjtRwjhdJFX
kauCoYXnIH
zjizqWXmK