Behavioral task
behavioral1
Sample
81d9d5644687938a2de94d94f06d9f8b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81d9d5644687938a2de94d94f06d9f8b_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
81d9d5644687938a2de94d94f06d9f8b_JaffaCakes118
-
Size
134KB
-
MD5
81d9d5644687938a2de94d94f06d9f8b
-
SHA1
a11b95b60448e4856cb582e56ea0d39f4f982e6e
-
SHA256
2be2af5135aff09c03a9676a1832ec019493dd6efb776c221bb83ab64876b390
-
SHA512
57b7360b886aae0134908edc6dbfc3a766f89fa9c811339e8449d3212a00110fabdabadfbb440194f857fb6e67a7e0e4386685d3023fb2e52e17251d9780e46e
-
SSDEEP
1536:tptJlmrJpmxlRw99NBk+aobJfg06G/sLX28/M4VUcTStEVZppeODa7ssaL:zte2dw99fert/MuUcxZpra7la
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
81d9d5644687938a2de94d94f06d9f8b_JaffaCakes118.doc windows office2003
kQSIzGDwt
QksOwacFBcQUI
DVMQIorpUpAd