Behavioral task
behavioral1
Sample
5dcad7b1c0dca174dbd586e30b37045e_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5dcad7b1c0dca174dbd586e30b37045e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5dcad7b1c0dca174dbd586e30b37045e_JaffaCakes118
-
Size
132KB
-
MD5
5dcad7b1c0dca174dbd586e30b37045e
-
SHA1
e625f0a7955e1b6d305f6efcab2338d4fbd825a6
-
SHA256
2074aa67a1a9dd4573a5fd34359e9a0b551faff26cb55f4f67593036944adcd5
-
SHA512
d30d2c63a100b715e01eabe24766dbe369bb90ca00f9b2a4b43c580aa1565d6074fbfa88aa2be5db866608f9fbf5b15d4e7886238bbb8568884824d5502ab5ba
-
SSDEEP
1536:7ptJlmrJpmxlRw99NBD+aE3V2ABDrtGcONzhSTSriGcNdrBgZI916TJaQ91:Vte2dw99fe96AxGcdgE16r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5dcad7b1c0dca174dbd586e30b37045e_JaffaCakes118.doc windows office2003
BIGvBwSwFq
GFzhMzYDth
EnPIwkwa