Behavioral task
behavioral1
Sample
5d26fff174b5864a0fd899ccb8c9a3fb_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5d26fff174b5864a0fd899ccb8c9a3fb_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5d26fff174b5864a0fd899ccb8c9a3fb_JaffaCakes118
-
Size
392KB
-
MD5
5d26fff174b5864a0fd899ccb8c9a3fb
-
SHA1
dd8726066ddae317bb9415b994e82b8d3c89eb18
-
SHA256
54257271a5f00afb180199a38c277e9257e907407ae6d7b9e0e5e425d8fd37e0
-
SHA512
524fdc7a602a22d6a0cc662fb89ed3a69491177414f40ede8a0441e2f02292d57b505e6ba03804f413a70f825e41f1420e258128a43967257c515a7fc1ce0246
-
SSDEEP
6144:niIpBWik+MmAQoMfMWDceTo59x9r+RSwujd+Ao7pt:iIprkNmAQo0MWDcTbKQTjLott
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5d26fff174b5864a0fd899ccb8c9a3fb_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros
Module1