Behavioral task
behavioral1
Sample
747c9d7f8042899383819dbfa708255b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
747c9d7f8042899383819dbfa708255b_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
747c9d7f8042899383819dbfa708255b_JaffaCakes118
-
Size
81KB
-
MD5
747c9d7f8042899383819dbfa708255b
-
SHA1
5ce6ac3e09c55780f26ceb1ae779dc96560d7f15
-
SHA256
ff717fe800f0aaf182856e2f7cfda5ec0744d0f5f591fce6e6b07e67aecd8bcc
-
SHA512
b9343ca089adb95d800ff6156392116b489e2cea7e4a5c77f38786fe4057d9c30c761a0d8d630d5185139f5ee59d0ab4b51d9b71888161b10d18a439248d8eae
-
SSDEEP
1536:zijWrMocn1kp59gxBK85fB7+ajZhg5aPiAJv6jw6:zV41k/W48pjkL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
747c9d7f8042899383819dbfa708255b_JaffaCakes118.doc windows office2003
RQwaMrXj