Behavioral task
behavioral1
Sample
797ede5d36d727aa267fe746e0b57bdc_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
797ede5d36d727aa267fe746e0b57bdc_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
797ede5d36d727aa267fe746e0b57bdc_JaffaCakes118
-
Size
154KB
-
MD5
797ede5d36d727aa267fe746e0b57bdc
-
SHA1
f92ca04799454cfa3c32df7e4b76e5ecef06762b
-
SHA256
e164e71625c14bb85c78f2b0409f4571ff6ee78eec0ff1417c15939e69da4eb5
-
SHA512
6ac7a085420a5664e8604f3cc7542593550e06bf93cb59dbfb179b5cdc1c54459af194f64479b3da05f9a76337db2b55edbb095f25880c8dc4c24b02523da831
-
SSDEEP
1536:7INVczHkD9icmT+FFdZ+a99hnd+vK5dbVCpdKEEFe3wpeKxX/85AFcndRJ/p:7In/iKFbhd+Ytxxv85AFcd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
797ede5d36d727aa267fe746e0b57bdc_JaffaCakes118.doc windows office2003
PhoNjoqrQYVI
PkAiIXtTisuJw
lfFvSqAqD
wqOZiQdj
zPGlknw