Behavioral task
behavioral1
Sample
71839333572e0e0d8c787401e43f94ee_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
71839333572e0e0d8c787401e43f94ee_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
71839333572e0e0d8c787401e43f94ee_JaffaCakes118
-
Size
235KB
-
MD5
71839333572e0e0d8c787401e43f94ee
-
SHA1
56a597092b8166415c3bf1577f93c2aaeb37eb1d
-
SHA256
1f5d5052d3adcfc9b05f321306b52ea74d91423f5320cc8007e7bbf65dc703f2
-
SHA512
c67b6d7bdab3b6e44f6caa3f669525c3ed6ff3ff4715f0009f852827ae3a4bbba840afcb039430c05843ddce2890fbdecf5a15d14626b858044f902562da3da2
-
SSDEEP
3072:gpLwpCgILInj2ZEiNhfWqqmeOxxOlJeWgH0iwu2gpGd6Y5xv3eCP9:g+ALujME9qqMbOLeWgHd6gEdzB3ey9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
71839333572e0e0d8c787401e43f94ee_JaffaCakes118.doc windows office2003
fiKSLDDp
zRnQiChXzkX
brNRkFrmti
GsqEEKAzrcKvj
ijdvZSO