Behavioral task
behavioral1
Sample
68f3c519678516849437b27ca27c7b8e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68f3c519678516849437b27ca27c7b8e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
68f3c519678516849437b27ca27c7b8e_JaffaCakes118
-
Size
44KB
-
MD5
68f3c519678516849437b27ca27c7b8e
-
SHA1
3eaba84c8751e9eb13c2a0f88a188d6d8a0b4e41
-
SHA256
25a3f2e98eda441b0eb55addd363b0806e1f935702e4b417f3f39be2eecbcc77
-
SHA512
8d7daaa395275c71f54ea960fc49c1b1cc3b9d16b1f056fc4396d74bd00cf72df9a7e5c8cc01f65923afe2bf4f885d7be41efc70cb270df205b41a4827287bc3
-
SSDEEP
384:wtf8iSUR/8dATqNLi08krZuHzQjbuMZZzkExygcPEdEsKhb2YOPyg/P0jNItU:C/qAaLiELbZZ19yhEd6yPJ3K
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
68f3c519678516849437b27ca27c7b8e_JaffaCakes118.doc windows office2003
ThisDocument