Behavioral task
behavioral1
Sample
2ce290ca094ed8463ef92edd6ab81bc5_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ce290ca094ed8463ef92edd6ab81bc5_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
2ce290ca094ed8463ef92edd6ab81bc5_JaffaCakes118
-
Size
813KB
-
MD5
2ce290ca094ed8463ef92edd6ab81bc5
-
SHA1
eacd289f94dee280801f2c809e7953bd3e1b552b
-
SHA256
8e8d49d1d98dcfd700c83be3d7a0f9440dbb47abb34a6c7195cf2da1d9ae2faf
-
SHA512
ec2f2df0506e0cce93b9293f8cdd2857b7a75b8918a478ec365450269e06d7bc44ab9abaee0416a81093bae78cd037496d8fcc262d1d065350e9a851ca38ea66
-
SSDEEP
12288:uoX6UWhGqOCC49wuvm0mYBIpuHBxKaaYKco71rRUNV3jd6HHKT5QljYU57Pp4ARc:Fbc8ar1NhuKlbUVlSR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2ce290ca094ed8463ef92edd6ab81bc5_JaffaCakes118.doc windows office2003
ThisDocument