Behavioral task
behavioral1
Sample
8e9915043975b67b01971a4ad74fe789_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e9915043975b67b01971a4ad74fe789_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
8e9915043975b67b01971a4ad74fe789_JaffaCakes118
-
Size
78KB
-
MD5
8e9915043975b67b01971a4ad74fe789
-
SHA1
fb0e04b39f2ee5400e89c08f0ce8cb2bf66d97a5
-
SHA256
07afeb101eab97daac3863600d40b1851bd710d4481dbe0a93459fd07624e468
-
SHA512
85813d5d38ac484c5d915c1352d4ea015ee2df145bd028323a53c62d6f1995720e86fe3957230c734a71b84d345ea47c9dc1e68520d319d0f8a80c790988a844
-
SSDEEP
1536:VptJlmrJpmxlRw99NBE+aGW3CDp1n+xYpKY:rte2dw99fk3mbn+2pZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8e9915043975b67b01971a4ad74fe789_JaffaCakes118.doc windows office2003
hBfqbVnmID
RlVbNBNdqzcwzt
RACSTHm