Behavioral task
behavioral1
Sample
719b744a0de134515f7020f4f02fd9ac_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
719b744a0de134515f7020f4f02fd9ac_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
719b744a0de134515f7020f4f02fd9ac_JaffaCakes118
-
Size
71KB
-
MD5
719b744a0de134515f7020f4f02fd9ac
-
SHA1
a97a77f1b61c2640575b3c75d78985dc1d606695
-
SHA256
1316c887d94e24f942b882ecbe7314ef4746e2800122b27bb0086e8aacbb8b00
-
SHA512
30791787272c6582d02d0f512ec96d5d36ec51398b2e032c76e730e937977cff9e8e21788efffd834f48d72eb9ae78a291ca8260bf3aadf2ca8bf52bff4fcd35
-
SSDEEP
768:upJcaUitGAlmrJpmxlzC+w99NBE+1o/9XXMmBktlFAO2vxwpF:uptJlmrJpmxlRw99NBE+a/VknF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
719b744a0de134515f7020f4f02fd9ac_JaffaCakes118.doc windows office2003
lHqtzFhEFiwAt
DkNKEipUEt