Behavioral task
behavioral1
Sample
3f03ad857859ba0f630c9d1d11d7ba30_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f03ad857859ba0f630c9d1d11d7ba30_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
3f03ad857859ba0f630c9d1d11d7ba30_JaffaCakes118
-
Size
13KB
-
MD5
3f03ad857859ba0f630c9d1d11d7ba30
-
SHA1
b82112f30fbc242e1d66770462b4226f4b0eecd9
-
SHA256
ad179d3b60d373325cfe621b5ed67d1ca86216ca4e99a79058fc793a6afc2bd0
-
SHA512
aca0704ff9001552f5ea78f573887f57b99df1853eb23589ec2d66eedb8192232961b03603f878c185e5b7bfdf7c5654cb1dacc116f2f830b975494e35b7b4c4
-
SSDEEP
192:m+J7WNf+F50jzk9kHU8lJwVt+pyz/vGz13nCftCnQ65Aa:zJ7W0F50jU/t+p8/Oz4ftuf5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3f03ad857859ba0f630c9d1d11d7ba30_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros