Behavioral task
behavioral1
Sample
63fde5a5eae57c19e0344ee9caf379d3_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63fde5a5eae57c19e0344ee9caf379d3_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
63fde5a5eae57c19e0344ee9caf379d3_JaffaCakes118
-
Size
333KB
-
MD5
63fde5a5eae57c19e0344ee9caf379d3
-
SHA1
de4d73cfb5e9a7c8009d07a28a493d64373a7fb2
-
SHA256
ba1053c23db1359f78c03323f6ae50a48648e5dd12d4d1e604a6c3ee683a3e81
-
SHA512
ad4a394d246dbfcf034fc0b458bc9b873d76bf5cf9f953e1f333de1c1b1f2ed36827f99946ce670244162220223c411e259a75aa56784bfda64eb74914023e13
-
SSDEEP
6144:uedFTWzFiYjF+b07WOvm09kEcn0B9CCT8c7o2Tvl:1FTWxiEFSQvm09Un0B0CT1s2Tv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
63fde5a5eae57c19e0344ee9caf379d3_JaffaCakes118.doc windows office2003
ThisDocument
WQnqeTl