Behavioral task
behavioral1
Sample
675c064aa83d1aa801143cdbf65cd503_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
675c064aa83d1aa801143cdbf65cd503_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
675c064aa83d1aa801143cdbf65cd503_JaffaCakes118
-
Size
68KB
-
MD5
675c064aa83d1aa801143cdbf65cd503
-
SHA1
198308c95173d6b940ef17e353063d363f5acecf
-
SHA256
b2dceeb815142be5d5b0ee068f13e95bc62c1759babd5b0ecce66d43c714aaf7
-
SHA512
ad6006e9be5db75382bc503e749d6e445f6ad22987d7200cdd3e6adc2b59b2bd20f2dc4ccdee0763848ff4a4731aa1c836c42382d44af41c3aaf7f276338af06
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBr+1RS20hT57jQqs9l:1ptJlmrJpmxlRw99NBr+rSbhls9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
675c064aa83d1aa801143cdbf65cd503_JaffaCakes118.doc windows office2003
EqGaisUUUhjoRu
hKjINDUialRTk