Behavioral task
behavioral1
Sample
7fbdddca76f7d44b974951404a7e06e2_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7fbdddca76f7d44b974951404a7e06e2_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
7fbdddca76f7d44b974951404a7e06e2_JaffaCakes118
-
Size
122KB
-
MD5
7fbdddca76f7d44b974951404a7e06e2
-
SHA1
d9f5cf9192ff3de4b9a2f67a6d8ebc6ff90daf0f
-
SHA256
6084622a1f6081c0abc5e5e299dbd13835f3dfa5dfd79a4e05f2281b9a74a856
-
SHA512
d7c1cac72f9dfda742b93ec4b27d0c14888797766f22442821f66eb41b87cfb5683607d2b75205c237dfe6ab92f788d75c3a84fc6ee7e78c1f31dd7e794c49ba
-
SSDEEP
1536:7ptJlmrJpmxlRw99NBD+aEGV2ABDrtGcONzhSTSriGcNdrBgZI916TJaQ91:Vte2dw99fn96AxGcdgE16r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7fbdddca76f7d44b974951404a7e06e2_JaffaCakes118.doc windows office2003
BIGvBwSwFq
GFzhMzYDth
EnPIwkwa