Behavioral task
behavioral1
Sample
6950a0540d8dab678ac1ce66e1119ec3_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6950a0540d8dab678ac1ce66e1119ec3_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
6950a0540d8dab678ac1ce66e1119ec3_JaffaCakes118
-
Size
131KB
-
MD5
6950a0540d8dab678ac1ce66e1119ec3
-
SHA1
b039b1f2a0fdd54a613a3249f1e1b8d8231a5abb
-
SHA256
c925ac3b2c8d3abd7b5d21b559d5d7ec31b435f095cd7c04ab70ec0c3b3da4ef
-
SHA512
3c464ea3bb1593c5c9f94394fd106c99504bddb87637a97919c3e8fa2f02bee026e656d89e0370c23e824b6749fc85d5bf17dbe3e22d220e35fc42370b1df8d1
-
SSDEEP
1536:PptJlmrJpmxlRw99NBP+aCny0w6mpQpveJeUJhdAy5vN0:Bte2dw99f+8HQIHfF5vO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
6950a0540d8dab678ac1ce66e1119ec3_JaffaCakes118.doc windows office2003