Behavioral task
behavioral1
Sample
3d92416fdb15c1217df5a6aa8ecc47c4_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d92416fdb15c1217df5a6aa8ecc47c4_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
3d92416fdb15c1217df5a6aa8ecc47c4_JaffaCakes118
-
Size
188KB
-
MD5
3d92416fdb15c1217df5a6aa8ecc47c4
-
SHA1
3b108bdcd8e07d5fdd3a4feb460e5823c966ce1e
-
SHA256
0735a173b6da64f53218f3d70f2eb24b54a067c985b36a0d75e99cc07d81112e
-
SHA512
b48f18223530bfcb6013cb1b785fe6837c191132a15fe3198da240d45ed0c6fdf44ce2aea1b2b061b38cc4d59a3b6625a376ead14a1e7b61a17fa69c9a6c45fa
-
SSDEEP
3072:Zte2dw99fyn+cNhyjLxpebblE1XSg3CBFkWKspV3VA+XhxnSTuFMiKf9HtMCgwEI:THdw7yn+c3afevSk4CpBf3u+/S7IN8An
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3d92416fdb15c1217df5a6aa8ecc47c4_JaffaCakes118.doc windows office2003
DmPfjHcBIGpj
lFVGKjDjltFIlj
KDLcKHXJzB