Behavioral task
behavioral1
Sample
7de097b4298bb1d15490367f8eeb24a0_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7de097b4298bb1d15490367f8eeb24a0_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
7de097b4298bb1d15490367f8eeb24a0_JaffaCakes118
-
Size
174KB
-
MD5
7de097b4298bb1d15490367f8eeb24a0
-
SHA1
f1455cfd530532579bf40d152465127750cb88be
-
SHA256
59f7287fb3c71394d9792c1f242c1ae2bbb8fa0674f7db378fab43cb4a3154bb
-
SHA512
ac65f477e5c664eca76246836946b0ecc8a0397c8a1f0487388824063ad3c121f2375f23ab7641b16de68880dd3d66333a7243e4c2fe4de354d6922a9cd39610
-
SSDEEP
3072:Gte2dw99fKTaMlmQonoDfoxul4X4ODmniP6fuS5O9UpFJElSFF5yMc2OtBC+3IpC:2Hdw7q11onoDf0uSO7p
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7de097b4298bb1d15490367f8eeb24a0_JaffaCakes118.doc windows office2003
NkpcXPO
tFQDXpkQS
izsEJsdvJuSZ