Behavioral task
behavioral1
Sample
945a02b7da8324e52fcbbcb06a85f39d_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
945a02b7da8324e52fcbbcb06a85f39d_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
945a02b7da8324e52fcbbcb06a85f39d_JaffaCakes118
-
Size
30KB
-
MD5
945a02b7da8324e52fcbbcb06a85f39d
-
SHA1
5e0bfc1498b4ee7da03972b842ea5b263b066d8b
-
SHA256
2b9c1f9371942278b559879e0cc74937ba5fde8fc7fccc3018ee8c92dcd06651
-
SHA512
52203ccf7a15d8ff9222eb367bdfbbb327c639e51ef9673a741dc2ad9d86c135e4649eccbe8756be576d0993c1c208b7c957b21d4df80c8714e4ebba8850a06f
-
SSDEEP
384:IPb1P0Km+cOr+jFVl5u/3YmMXh3NS5c7z8tR7uo/QRYvPKzgyUoFT+aKT3F:Ib1P0K4Qmn56v2NUVtBQRYvUgyRFRE3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
945a02b7da8324e52fcbbcb06a85f39d_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet4
Module1