Behavioral task
behavioral1
Sample
945b18add7252d7ba1472abc1f3f05eb_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
945b18add7252d7ba1472abc1f3f05eb_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
945b18add7252d7ba1472abc1f3f05eb_JaffaCakes118
-
Size
109KB
-
MD5
945b18add7252d7ba1472abc1f3f05eb
-
SHA1
bb7e4996e89a918a33b7455c376cae81c50befdf
-
SHA256
10092b5e119838fab1c0b341e93fb803dc5e545047ffc21f99a3b8e291ae2280
-
SHA512
1c8f11f2a7dcb9fd67e7bc243876d55395ac277f23853498ca8748a0adbd2d277511eb82f7b79b13b4c1edcb168573e89b6ca4ff0e1361034d02d5744464c4d9
-
SSDEEP
768:vbth9cshk6tWdmUx7mOUPwAy91LSi4TSUaThfFlC7Dbxz99G26bC:vbpNkscv7mvPw5qi4TSlThDC7Db3Ee
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
945b18add7252d7ba1472abc1f3f05eb_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros