Behavioral task
behavioral1
Sample
831b61ff902828c1dd6c78a25c42b352_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
831b61ff902828c1dd6c78a25c42b352_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
831b61ff902828c1dd6c78a25c42b352_JaffaCakes118
-
Size
85KB
-
MD5
831b61ff902828c1dd6c78a25c42b352
-
SHA1
b533da9c15c519d4d55f8df854a5935c212a81cf
-
SHA256
e18b1c0d39833232a9e66756d91984394b567762d33bc6141e6b7a899692ed25
-
SHA512
fa242bb64555a3363f59ee7eb008078f4af0c0dc73722f61a24760f0df34b20762e9066aa1ef3b3fb83e28eab5acba333db95506442eef33cf7251431d30a28c
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBy+1pjSmpX+nTAlLouQwe5+n4vTvy3L:1ptJlmrJpmxlRw99NBy+PtX+nOK44A
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
831b61ff902828c1dd6c78a25c42b352_JaffaCakes118.doc windows office2003
bWRoMqWUVLYQ
zNKbdFFfYvGTw
kTzTETTaQQDikV