Behavioral task
behavioral1
Sample
852fc4978a99b4ecdd7516cf6e264def_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
852fc4978a99b4ecdd7516cf6e264def_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
852fc4978a99b4ecdd7516cf6e264def_JaffaCakes118
-
Size
246KB
-
MD5
852fc4978a99b4ecdd7516cf6e264def
-
SHA1
aa5367684c2128a303d2560a5bd07205edbe4400
-
SHA256
4f0bb94fa14926b05d3da90d10792207ae3555da2b98044b62da97d42b603fe4
-
SHA512
c1a590d6d251993bf67c255f1062fd379eee2712ae1e02204ad158230cada8f514d5e2e562bdb9a6ac2ee513853edead595ab6c44902a269997ac529056fd780
-
SSDEEP
3072:WH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5AyXJm9YBmjDzelOP3l0zTq:WFVeEsjdXRC3jexGG63YWofzes3azTq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
852fc4978a99b4ecdd7516cf6e264def_JaffaCakes118.doc windows office2003
CBzXuqZ
TVBWWOiAtYtk
mwLtdfp