Behavioral task
behavioral1
Sample
8e97fb9ae61276078d02a0f96796b53e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e97fb9ae61276078d02a0f96796b53e_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
8e97fb9ae61276078d02a0f96796b53e_JaffaCakes118
-
Size
290KB
-
MD5
8e97fb9ae61276078d02a0f96796b53e
-
SHA1
1ef4f6d7a8bf28e855458f55ccbaa322152ffffd
-
SHA256
aef703b3c0222fae2afdbdf558cfef1aa327c06608d4c583a9c1a6dcaa169c47
-
SHA512
6fcd0a8680c3836f796bf81e27e9273c648c81dac8c6deac235d259ba648abb03372e615e987c361b33898f17773d9287cf8c1040b15c11bd50e1bc455759e38
-
SSDEEP
1536:8AFNU2ieWA0KTSclQdhJ7SzvYSD538zR+pek0cSWpXjybt4KK:8AFseWDclQdhYzvDz89K
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8e97fb9ae61276078d02a0f96796b53e_JaffaCakes118.doc windows office2003
ThisDocument