Behavioral task
behavioral1
Sample
59e447e4f4dc430a2fa225dda10aeb20_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
59e447e4f4dc430a2fa225dda10aeb20_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
59e447e4f4dc430a2fa225dda10aeb20_JaffaCakes118
-
Size
206KB
-
MD5
59e447e4f4dc430a2fa225dda10aeb20
-
SHA1
1582f27a27a5ceb1066e50e2ded5088b2dd9c118
-
SHA256
666edb5d9868c952bd0fa5ed0741e23cd81f0c74832c73186fc6e1304d4e39e1
-
SHA512
2c3b047038e2af63a45eb0a429f0a3350f4faf42c9be0e70ec82997ac0c50e6466341da5c1347458f995d835a7a3e3899094c7ad1b38e58e79facc39acd4e3f3
-
SSDEEP
3072:wH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5fyXJm9YBmjDsl5zZMr:wFVeEsjdXRC3jexGG6kYWofsx0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
59e447e4f4dc430a2fa225dda10aeb20_JaffaCakes118.doc windows office2003
tqjItmCjm
JUwTvpAXmB
iNHUswhDKqYBs