Behavioral task
behavioral1
Sample
666a16b049f3a00371215eba9f077b95_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
666a16b049f3a00371215eba9f077b95_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
666a16b049f3a00371215eba9f077b95_JaffaCakes118
-
Size
3.9MB
-
MD5
666a16b049f3a00371215eba9f077b95
-
SHA1
00a0e60c55c53dd669f0202c16f4d2d8e2874c33
-
SHA256
8db139ac1f5c566fda6de1e374ce560de79d32fa831ea914396b22a6e86868d8
-
SHA512
3f0ef337051a116109d461b2554354db7ad9f5e45b26ae7bca4e28355c93537f411cf47f87897136e2849a338300415403c74eb9b5da0b187236d97685ab5d43
-
SSDEEP
24576:J/NffCu7Js8hdfej6odyRmfxBydeZrqC7EpReOuBBpR6xP6rA1A054CD:hCYfeOuj6xPH1Ae
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
666a16b049f3a00371215eba9f077b95_JaffaCakes118.doc windows office2003
ThisDocument
UFC
UserForm1