Behavioral task
behavioral1
Sample
8ba4a9907e1cff8a46794167c5f854f3_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8ba4a9907e1cff8a46794167c5f854f3_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
8ba4a9907e1cff8a46794167c5f854f3_JaffaCakes118
-
Size
140KB
-
MD5
8ba4a9907e1cff8a46794167c5f854f3
-
SHA1
c163814d6e034361a4ff685694f4302da7f85523
-
SHA256
83b514488902700acd567af94312d743cee6c69630c780e5b735e5e5a80162ac
-
SHA512
ad761a16ad3b96259147c31b8f3847636fe56aa28283b268eff747416fc25f6c8057cdcc639943f1632f6d7670c6de39282199ca023afd15d59176a7218a3c0d
-
SSDEEP
1536:Zu81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadp+aZys+Pz+kp:g8GhDS0o9zTGOZD6EbzCdXGaU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8ba4a9907e1cff8a46794167c5f854f3_JaffaCakes118.doc windows office2003
vvHzpVdQmlPSj