Behavioral task
behavioral1
Sample
5e40afb62420bbc6ad25da48721f29eb_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e40afb62420bbc6ad25da48721f29eb_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5e40afb62420bbc6ad25da48721f29eb_JaffaCakes118
-
Size
266KB
-
MD5
5e40afb62420bbc6ad25da48721f29eb
-
SHA1
c7e7893c679f57b297ccdf7b2da61488f7c9cf0b
-
SHA256
6038c03c5a2f937de49b0e78c86dd25cc0c2b9677c8b824fa0a71d66b700b881
-
SHA512
876a42006821d90ca7de7e34b6987ff115d7a9c9de3bfcaced498494285eba060558c8d744773d988c7d691a63a1a133f9c7240ff8b9711ef583aa8543301f6b
-
SSDEEP
3072:VkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYCUB5BEiudV:VCwQK3RpVS7G4SVuz1QzLhxztsZGPwa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5e40afb62420bbc6ad25da48721f29eb_JaffaCakes118.doc windows office2003
ThisDocument
sIpNl0ZEt
iDiyq
NoRnJ
f