Behavioral task
behavioral1
Sample
655ba96371ccfc883aca4acb3a5685c2_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
655ba96371ccfc883aca4acb3a5685c2_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
655ba96371ccfc883aca4acb3a5685c2_JaffaCakes118
-
Size
230KB
-
MD5
655ba96371ccfc883aca4acb3a5685c2
-
SHA1
fa52c8ec2f70db0e8bae5d0e65f93bff8f1768a8
-
SHA256
248e01f5e9b5a1dd5ea5520f6f08cd5bee2642bb4f381475f7af2a0c45b3ad65
-
SHA512
1fc3031d7590f40f2fdec5290e8472c7bbb689b5e534f6579e88ec4a44cafec27728002222e91603b93c897ed699a6a8924f334279926c2ffad5eeb8d8319d9c
-
SSDEEP
3072:5H9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5NyXJm9YBmjD1kQymWd:5FVeEsjdXRC3jexGG66YWofp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
655ba96371ccfc883aca4acb3a5685c2_JaffaCakes118.doc windows office2003
bGLvNzP
mfiEnVvaTPk
KCbwpvbSk