Behavioral task
behavioral1
Sample
2ed422fb4a023af73c40611052c5dedc_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ed422fb4a023af73c40611052c5dedc_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
2ed422fb4a023af73c40611052c5dedc_JaffaCakes118
-
Size
167KB
-
MD5
2ed422fb4a023af73c40611052c5dedc
-
SHA1
d16936fefffd9db05d009149b4ad31dacdbc7359
-
SHA256
5728aa05ef3551aa19530c31280bb3ea3c1e3a5002a0d7ff73c0defedf6d5f13
-
SHA512
298c3acbc0481a276dec0c7a6dbdc34e572b056658fc202a4361b5b1de81abecd704982603f0ebca426f63570ee5e054df872525005272764bba5ff89200e330
-
SSDEEP
3072:ExjnB29gb8onvGflgQjDic88w065Zh69txcqYtl7vtWQAO:Exy6Qj7Hw065Z4x3Yb71W
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
2ed422fb4a023af73c40611052c5dedc_JaffaCakes118.doc windows office2003
mGdSmnqnOajOVF
tVFzKwwwIQX