Behavioral task
behavioral1
Sample
2a7da0f6e019d03e4c8f10b4d208c2a6_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2a7da0f6e019d03e4c8f10b4d208c2a6_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
2a7da0f6e019d03e4c8f10b4d208c2a6_JaffaCakes118
-
Size
8.0MB
-
MD5
2a7da0f6e019d03e4c8f10b4d208c2a6
-
SHA1
39325e49eeded98f26ccab35a24eab0ccc61ed24
-
SHA256
0b885baf102fc059127183908e04c4a5643216f3d67d1af01c3a85a6ca8bd2a8
-
SHA512
6f06ee7cba528972963703e3d7efba722b07081236338d6b14bc29bccda5d1a6bf161864322d06673d779ad35c64f0ffba14d2a922644650c20b9a0696271033
-
SSDEEP
98304:6HOrkvtdJ1tcqKVyrNoo2jUq1DuTd6LZJoIEbrHWB0rNLMeUoxuFqT3SFwszgSXs:VIvtdJ/cq5lCZJSj5rNr73rZSXJg/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2a7da0f6e019d03e4c8f10b4d208c2a6_JaffaCakes118.doc windows office2003