Behavioral task
behavioral1
Sample
609b32adfefe0335329d641e591ca1ed_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
609b32adfefe0335329d641e591ca1ed_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
609b32adfefe0335329d641e591ca1ed_JaffaCakes118
-
Size
80KB
-
MD5
609b32adfefe0335329d641e591ca1ed
-
SHA1
fcb99089f301a2e0c494519d0e21cf5b0f2d26b3
-
SHA256
dcd7feb1774d994996fb3822536bf6a65b183aec087c735cac707c666afb8b54
-
SHA512
1496bd1c73b89e207d84f766d1f9c3459df4973fae5e64633a58cf0f6215ea1a0641e7b4db3a4399d3af7a436fc324f8f80a46400a5f3c01a67a94bf61299e16
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBy+1pjpmpX+nTAlLouQwe5+n4vTvy3L:1ptJlmrJpmxlRw99NBy+PaX+nOK44A
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
609b32adfefe0335329d641e591ca1ed_JaffaCakes118.doc windows office2003
bWRoMqWUVLYQ
zNKbdFFfYvGTw
kTzTETTaQQDikV