Behavioral task
behavioral1
Sample
5ea883004d326d7d993fe2b828e1c8d3_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5ea883004d326d7d993fe2b828e1c8d3_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
5ea883004d326d7d993fe2b828e1c8d3_JaffaCakes118
-
Size
133KB
-
MD5
5ea883004d326d7d993fe2b828e1c8d3
-
SHA1
2c9131b0490b9866572eafb9b1124a1edc4886b2
-
SHA256
9c0dff4dd890ef8601826bd9b8cb1d351f75e298e5e23e7a9abc40dc3fa99011
-
SHA512
485c50614f91f3f4c0dfa39cf8e74da2ce2b06af6356b2725ea26a508555025c98cf9fad233bbf676552aaf3d1087eb7129a49b1f0964de4134dac2b21a02e99
-
SSDEEP
1536:7ptJlmrJpmxlRw99NBD+aELV2ABDrtGcONzhSTSriGcNdrBgZI916TJaQ91:Vte2dw99fy96AxGcdgE16r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5ea883004d326d7d993fe2b828e1c8d3_JaffaCakes118.doc windows office2003
BIGvBwSwFq
GFzhMzYDth
EnPIwkwa