Behavioral task
behavioral1
Sample
5cfee0a5b2a73cbb6a23997d373edfd8_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5cfee0a5b2a73cbb6a23997d373edfd8_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
5cfee0a5b2a73cbb6a23997d373edfd8_JaffaCakes118
-
Size
74KB
-
MD5
5cfee0a5b2a73cbb6a23997d373edfd8
-
SHA1
d0abee53969be0036fe9fd3f165c28b3c08272df
-
SHA256
278d0a868bd610c4c04712f7a785d9cca64d1bea4b83b8d3e55233191954385c
-
SHA512
2c67c659214e15d80ea4bf7c532181b3426db0a3b367c4764b86558926f3d6348c7a4d4af2f3f37c13b2ef3975462394676e7a4916bb4ced3fe9614588645e60
-
SSDEEP
768:BpJcaUitGAlmrJpmxlzC+w99NBE+1oIo4CkqeW23/rMlnv:BptJlmrJpmxlRw99NBE+aIF1/rI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5cfee0a5b2a73cbb6a23997d373edfd8_JaffaCakes118.doc windows office2003
dQWziwtvfzDdA
FEialRJiNBcZf