Behavioral task
behavioral1
Sample
7ad0b4306a1be84bfcf2d7796025cdce_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7ad0b4306a1be84bfcf2d7796025cdce_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
7ad0b4306a1be84bfcf2d7796025cdce_JaffaCakes118
-
Size
265KB
-
MD5
7ad0b4306a1be84bfcf2d7796025cdce
-
SHA1
642aaaaabb19351d3cae740ced6430a81ba9ff98
-
SHA256
cb7fed639a8ea9b95fa1af6d317298a58346d67afd56a281d8ac0ab7196b1e61
-
SHA512
0936b28252f029ccd7cef4de2539fbd5ae1ef42735d07979d138aed7f2e30c5dfbcd2cd6c6197bd74f0b73bcb63ce47aa39897815c68556ebf5513d79d3dbe0c
-
SSDEEP
3072:7khgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYPy+SrvFUBU:7CwQK3RpVS7G4SVuz1QzLhxztsZGPwt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7ad0b4306a1be84bfcf2d7796025cdce_JaffaCakes118.doc windows office2003
ThisDocument
LhyvCR
yyCuJDEjQ
yM1V6EqB0
f