Behavioral task
behavioral1
Sample
5b5523e3de0be3f3888924ee205feefc_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5b5523e3de0be3f3888924ee205feefc_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5b5523e3de0be3f3888924ee205feefc_JaffaCakes118
-
Size
87KB
-
MD5
5b5523e3de0be3f3888924ee205feefc
-
SHA1
57a0ded868c84a681e05aacfa483e9cf2bdd0875
-
SHA256
6fc0496f0b92374c976b56da6a0e3aa03bd960a04207a0354b0f2ba6c2654be9
-
SHA512
0049a31b6e8fb45d7fddf1b98beda860b8ce21d21ac74efc1a9018ab6b494180b05580a5842a223462d8c1170c16ea7439bf9aff38004b73de145445f3ffbf71
-
SSDEEP
1536:+Bocn1kp59gxBK85fBnx+amHIUAHcAdAbRjf7ZD+gB:X41k/W487oRnZlB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5b5523e3de0be3f3888924ee205feefc_JaffaCakes118.doc windows office2003
vUOGvVsqYQkM