Behavioral task
behavioral1
Sample
2b758ef78a58f156708f64a9fef3a6f2_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b758ef78a58f156708f64a9fef3a6f2_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
2b758ef78a58f156708f64a9fef3a6f2_JaffaCakes118
-
Size
72KB
-
MD5
2b758ef78a58f156708f64a9fef3a6f2
-
SHA1
8705a1ddbdc89c8bc68ea2318b97beb80637fedb
-
SHA256
9a12419b61f95012a1241bf400f0fc6a82dd0297495d7adc1c2bf5f94751ca92
-
SHA512
83a22d100fe5371e07055b6db0933ae6f85b48c3240724b833eef1acaf384e362671356d87fb96928aba8edbb93e79a2efbb60d031eed570ae917b833c7df190
-
SSDEEP
768:CpJcaUitGAlmrJpmxlzC+w99NBu+1omhnm5vrxdF7+i:CptJlmrJpmxlRw99NBu+amMFy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2b758ef78a58f156708f64a9fef3a6f2_JaffaCakes118.doc windows office2003
NaMQbpti
TlGJihvGEsd