Behavioral task
behavioral1
Sample
7404ebd4dec5eea586afc4b4a020e294_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7404ebd4dec5eea586afc4b4a020e294_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
7404ebd4dec5eea586afc4b4a020e294_JaffaCakes118
-
Size
70KB
-
MD5
7404ebd4dec5eea586afc4b4a020e294
-
SHA1
374ef9c64d3649d4951ae816ad4507346dbba609
-
SHA256
3d1d782eab81acc5eaab2e00bef6c52112f5511aeae6cc13236f99cdbf252f47
-
SHA512
ad0e418cec3d5881d41ec94106b5308079d126af947d43cbccc516d0affcaa90ff03d16ff78b49005030791a7413853d61c00bfb0625d5abf507901009a119d0
-
SSDEEP
768:BpJcaUitGAlmrJpmxlzC+w99NBE+1oIouCkqeW23/rMlnv:BptJlmrJpmxlRw99NBE+aID1/rI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
7404ebd4dec5eea586afc4b4a020e294_JaffaCakes118.doc windows office2003
dQWziwtvfzDdA
FEialRJiNBcZf