Behavioral task
behavioral1
Sample
4bd2fcee80df39054b21adbd5f5d96fa_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bd2fcee80df39054b21adbd5f5d96fa_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4bd2fcee80df39054b21adbd5f5d96fa_JaffaCakes118
-
Size
108KB
-
MD5
4bd2fcee80df39054b21adbd5f5d96fa
-
SHA1
cc08674968d7858576da7d0198961e78f0a319de
-
SHA256
47a79c33524e7786346210a50c43761fc852bdf9d84c643bf4dfd34e592df9d3
-
SHA512
395f37bfb62afb2371f296ac77c28617b6e90f3353e8c9e48821ca3e1056fc5551d8809b0a25ac30051454dca6e6f94dc65d5a83b701e125da69d98a1341e734
-
SSDEEP
1536:xpdAAjg9VrjyeQT7Lr55mvWVRRiVUWrn6mrIXiXhqqt1pFySSFy:xPg9107DmvWTKUPxXiXYqtQSey
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4bd2fcee80df39054b21adbd5f5d96fa_JaffaCakes118.doc windows office2003
ThisDocument
module1