Behavioral task
behavioral1
Sample
7e6ffb367de7a4326ed811356096bea0_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e6ffb367de7a4326ed811356096bea0_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
7e6ffb367de7a4326ed811356096bea0_JaffaCakes118
-
Size
124KB
-
MD5
7e6ffb367de7a4326ed811356096bea0
-
SHA1
61178ab079b73429a7635246d496aca8cc241bc1
-
SHA256
e8c4904c4dc2493e7d7326a43e753d8f44a6397eddf22fa79de14ba2a31f0f8e
-
SHA512
417e9a3fd3c022a466e25a3b97de92c08b8f0737865534408011ea66101b6337a2b1ac528a7a0d752cf500107eb1ce9896b04243f907842654bfccfe45f94103
-
SSDEEP
1536:6ptJlmrJpmxlRw99NBt+aaWnT43MxuFHU1Y5la81clutdi48tO:mte2dw99f9c34K5lH16uPpK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7e6ffb367de7a4326ed811356096bea0_JaffaCakes118.doc windows office2003
WOKSzAjrcOJvkM
InrzrBVA
ZwRKiHwwdl