Behavioral task
behavioral1
Sample
2f2923935626ae0ced4dc4889395e589_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f2923935626ae0ced4dc4889395e589_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
2f2923935626ae0ced4dc4889395e589_JaffaCakes118
-
Size
483KB
-
MD5
2f2923935626ae0ced4dc4889395e589
-
SHA1
4dbb7c526b907736289e0c9102fbf57e2e0a18d0
-
SHA256
2cd5c0b3035f829d75be2a60eef0f149a433a519d3e0f45f13534960dbda43d3
-
SHA512
36cf40048f361e6e3c608d940b5001d454b5b17b2b2eeba3095eca98021676f3aa0de79046ee60402da7ca7fa60a910881d78d46c164a3072f1c57e63b89dc72
-
SSDEEP
6144:M+r1ULCtt8ojzN+ypiPaaGWfIY4zfTgMCjogEWIun6Tp:MIyMtHzIypWfIY4HgMC0gEWIu6T
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2f2923935626ae0ced4dc4889395e589_JaffaCakes118.doc windows office2003
ThisDocument
Module1
Module2
Module3
Module4
Module5
Module6
Module7
Module8
Module9
Module10
Module11
Module12
Module13
Module14
Module15
Module16
Module17
Module18
Module19
Module20
Module21
Module22
Module23
Module24
Module25
Module26
Module27
Module28
Module29
Module30
Module31
Module32
Module33
Module34
Module35
Module36
Module37
Module38
Module39
Module40
Module41
Module42
Module43