Behavioral task
behavioral1
Sample
4fcc54bb5023a4df39dac2cceea032d3_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4fcc54bb5023a4df39dac2cceea032d3_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4fcc54bb5023a4df39dac2cceea032d3_JaffaCakes118
-
Size
80KB
-
MD5
4fcc54bb5023a4df39dac2cceea032d3
-
SHA1
23d47aa15a357acb5a42c6682e250e84b8a2e4d0
-
SHA256
727b23b5e926318cf93b1b99d3c89e70fe7617c44e762c0ce90947d81987eb34
-
SHA512
bec207333ff344012320e5e06f94228670000ec78b0d0cf81bf33bf12b02f842717edd318af6ab56ffe19079bbc6d9a60a14dc34b547bc643a445f86077d2efe
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBy+1pf7ipX+nTAlLouQwe5+n4vTvy3H:1ptJlmrJpmxlRw99NBy+PYX+nOK44A
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4fcc54bb5023a4df39dac2cceea032d3_JaffaCakes118.doc windows office2003
bWRoMqWUVLYQ
zNKbdFFfYvGTw
kTzTETTaQQDikV