Behavioral task
behavioral1
Sample
3c2f8f8dac5246e51bc857a641e48d6e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c2f8f8dac5246e51bc857a641e48d6e_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
3c2f8f8dac5246e51bc857a641e48d6e_JaffaCakes118
-
Size
72KB
-
MD5
3c2f8f8dac5246e51bc857a641e48d6e
-
SHA1
193d4fd67ad532732b3f9a691c52e5a097b7a68b
-
SHA256
e0cf3f7c97fa78a43bd0eafe498fbb4e3cd6e984ce3404818c74efb3a00bfbc2
-
SHA512
b99f3f3e10621e2b6d4153da3069a728a2581c95e8b74520d8cf554f82dddf705d944e35261cc63b0f0ff436fcb4d73a35b13511d9660cf8321b5278c6827bf4
-
SSDEEP
1536:vJK+lhLocn1kp59gxBK85fBt+a9Rjduedt9+d5paxyNk:vJbla41k/W48zjduedt9+d5paxye
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3c2f8f8dac5246e51bc857a641e48d6e_JaffaCakes118.doc windows office2003
aDjEsPp