Behavioral task
behavioral1
Sample
3c8c6c3747c2c4df7f47fd41347dba1d_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c8c6c3747c2c4df7f47fd41347dba1d_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
3c8c6c3747c2c4df7f47fd41347dba1d_JaffaCakes118
-
Size
265KB
-
MD5
3c8c6c3747c2c4df7f47fd41347dba1d
-
SHA1
6a530591f6bbdfeca1c50865ca4de4ee04a78046
-
SHA256
721674b13fd245b3bdf8d3d84346a047df6f5802bbeafaf81dc9147e595107cd
-
SHA512
981acf41695e982dc0ecae441ce9891a6d662d3c3a298a52b99f72f6d8f06323c49d0bd58432a35976b07e4870bc7653a2ac0e6ffa6ab6eae4dc913e1d8b5739
-
SSDEEP
3072:kkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYouy+Srvn:kCwQK3RpVS7G4SVuz1QzLhxztsZGPwz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3c8c6c3747c2c4df7f47fd41347dba1d_JaffaCakes118.doc windows office2003
ThisDocument
XgPRF035
Iau6vFb
e5qLBS6Us
f