Behavioral task
behavioral1
Sample
3655e35f112e67bf2f46d067c3a205e2_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3655e35f112e67bf2f46d067c3a205e2_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
3655e35f112e67bf2f46d067c3a205e2_JaffaCakes118
-
Size
85KB
-
MD5
3655e35f112e67bf2f46d067c3a205e2
-
SHA1
50e903fa303f289fa31a69838310b704c90abc14
-
SHA256
d86edb496fff2f625384b59b074887447440eee74e8ed4a1172da9c4befea9ad
-
SHA512
57c2f91d0ef89d4c22805085e22ad1e1d3d2884370eaafceaec42d8354a125441003abb6d8c3b5e4f97d5462c1252b839c1a39f29437b337b3e27ec7f67c0ef5
-
SSDEEP
1536:3ptJlmrJpmxlRw99NBz+ajZPNAE21LNgq:Zte2dw99fV1G1Lqq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
3655e35f112e67bf2f46d067c3a205e2_JaffaCakes118.doc windows office2003
iccFcBSZv
KtIiqSZrzjn
NXbqdjaLqiWD