Behavioral task
behavioral1
Sample
99572849b83fa0f0735061b281e4eded_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99572849b83fa0f0735061b281e4eded_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
99572849b83fa0f0735061b281e4eded_JaffaCakes118
-
Size
118KB
-
MD5
99572849b83fa0f0735061b281e4eded
-
SHA1
4b00cd2156180a877b0ace954be39058e9a1d2f8
-
SHA256
f2368caf0bf0dc70ff70ef9745bd6a5666c06409db47c3546b315768e3cb41e3
-
SHA512
0e088eb11c184d29005f3648bc0c4be140b377120e817221185aa1b75d24aa0fadf73b1cb11069587d7bd72251dd05342031623c7c1298e0d0af89ec4a30a27d
-
SSDEEP
1536:6ptJlmrJpmxlRw99NBt+aa3gT43MxuFHU1Y5la81clutdi48tO:mte2dw99frc34K5lH16uPpK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
99572849b83fa0f0735061b281e4eded_JaffaCakes118.doc windows office2003
WOKSzAjrcOJvkM
InrzrBVA
ZwRKiHwwdl