Behavioral task
behavioral1
Sample
7a37351bb4f50adfb2ff8b76627673fe_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a37351bb4f50adfb2ff8b76627673fe_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
7a37351bb4f50adfb2ff8b76627673fe_JaffaCakes118
-
Size
175KB
-
MD5
7a37351bb4f50adfb2ff8b76627673fe
-
SHA1
61e221cb9b92317779f7626bbd7ab4a59b08c239
-
SHA256
5da30aab99018bc70a991af1f72ef7596ebc15b8f6b4c5f7a5e761da7a6c1d0a
-
SHA512
d2406d0b01972d920ed10192ab52336c2ecc45c2722b5b29c999b1c2d4a203d1a1bd2e02a9722d10564fdd17bad454a44eaaf1aa40077c7af87b7ab29e60f88f
-
SSDEEP
3072:Sy6+FlvvgFsvoJF54+5Ooiq+d057EnhFXrnngJni8ymUFZEvLXolXVgAVmjl2Lwa:Sy6+fvYGCF7nig57ck0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7a37351bb4f50adfb2ff8b76627673fe_JaffaCakes118.doc windows office2003
ThisDocument
RDM
Class2
Class1
Class0
Module1
Module2
Module3