Behavioral task
behavioral1
Sample
5b6885ebd83a7ac6d4e9ded6017d7032_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5b6885ebd83a7ac6d4e9ded6017d7032_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5b6885ebd83a7ac6d4e9ded6017d7032_JaffaCakes118
-
Size
34KB
-
MD5
5b6885ebd83a7ac6d4e9ded6017d7032
-
SHA1
e655f2f8ee392fae26292ce6d3dc8066acdb7906
-
SHA256
30a49eeed2dfab51b07cf23e948a33c6c2b51fd27c4b2aef506ea16a200ec7bd
-
SHA512
6030f2d26baeeaaa925ec5426090889e00f475904ba4baf996a0908dc5c61fdb0422887c84a36fe3d328bc8b2fe98625c5335516504eb19b461d6b00ec40fb5f
-
SSDEEP
384:zA4dzY0WpSbuj/LdPvenCpeJzKoSS3DyJe8oYGBhPEI8368osCg3Tp:ddzY0WcqjjVenFFRDM4YG/hiSsv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5b6885ebd83a7ac6d4e9ded6017d7032_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet4
Module1