Behavioral task
behavioral1
Sample
5d556be2d8f7b1ee8cf75c1fdbc3258e_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5d556be2d8f7b1ee8cf75c1fdbc3258e_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
5d556be2d8f7b1ee8cf75c1fdbc3258e_JaffaCakes118
-
Size
88KB
-
MD5
5d556be2d8f7b1ee8cf75c1fdbc3258e
-
SHA1
64a38f77f27e6c43f2c442b292c601713d649252
-
SHA256
f56253a906074b2f40c32b182590049f4aa89644d9904f74021dc6a2333e17be
-
SHA512
aae1f5e0374dc67428dca48a54019a70cb65e843406eaf96530e327de0cf798cf4e7afe4fb5d61672091737c73288e1fee2cf3dd09d5d875e0b526fbf14a5329
-
SSDEEP
768:SJOVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBZ+1oQAb8gLyVvHKyoZXrQ/iJw7o:gOocn1kp59gxBK85fBZ+aQuFDyg0i64/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5d556be2d8f7b1ee8cf75c1fdbc3258e_JaffaCakes118.doc windows office2003
LFvMOUDH