Behavioral task
behavioral1
Sample
886694c6338907fa64152ed83c1fa19a_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
886694c6338907fa64152ed83c1fa19a_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
886694c6338907fa64152ed83c1fa19a_JaffaCakes118
-
Size
198KB
-
MD5
886694c6338907fa64152ed83c1fa19a
-
SHA1
b667fdf9c03757a96a59750f5d52ba4a81beb51a
-
SHA256
5b6a71d654faa097ee6d0dec70186b895ccd58f1de157a748fb52b9ba28c8411
-
SHA512
31f11747780f15909e73a70e579bd49c5859466cf41e9e2e1fa0be72a1d67517fed1e80b1b12c3aab5bba84cb2a03dcba97966cfd3db83b553754e7aaaa45ddb
-
SSDEEP
3072:jFPtbFOIRGGvCT0gqIdCVRXThqZGTTT/9tjTgq3nfQ/vfcCJIkozK:jFPtyMCbhdCVzyGTTrnwq3nAvUCFj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
886694c6338907fa64152ed83c1fa19a_JaffaCakes118.doc windows office2003
BaDBJhMmoGmQRL
afVpIwvPB
PtUoWXVdzf