Behavioral task
behavioral1
Sample
3f1677ec9208e04769ec7ff29610de69_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3f1677ec9208e04769ec7ff29610de69_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
3f1677ec9208e04769ec7ff29610de69_JaffaCakes118
-
Size
117KB
-
MD5
3f1677ec9208e04769ec7ff29610de69
-
SHA1
641edf8ca2abbf97d7d4a9a9b9e5d9c45f2ec65e
-
SHA256
c2064bf8c84ee9b8d826b4bc4289f3420f87db255d2add113be47e28922a8c66
-
SHA512
10812cf2a62ffdfd0bde351f2c2d3b5b3ecbecf12bb772ab79dd4bb4ab2305f156c692ebbc2d654457f8f3ce86e106cdbe5776480181d4cbd0e93e208ed40d97
-
SSDEEP
1536:SptJlmrJpmxlRw99NBC+aiyrdIJCmF4yPOpixUgp/0aorGDlP3K3IcF4:Ote2dw99f2SJCjKOgr/BGA3qlF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3f1677ec9208e04769ec7ff29610de69_JaffaCakes118.doc windows office2003
isAZnTMVqjUrL
hUEwwFIJnmQWF
PXFrzMarO