Behavioral task
behavioral1
Sample
9704e1c7c66ff55edecf06bb4283d979_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9704e1c7c66ff55edecf06bb4283d979_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9704e1c7c66ff55edecf06bb4283d979_JaffaCakes118
-
Size
100KB
-
MD5
9704e1c7c66ff55edecf06bb4283d979
-
SHA1
3a7a6dc36f2541c0e0459161dccc470bffc4d487
-
SHA256
2a0bcbc7e88106e1e348d917c3186c9d692a1238cba0802704d22a8dc747b503
-
SHA512
4d67c6aea52b379503bcadeadcdd86b13a30809ff1a288c74af816e9bb461454222433d83aca6b2cfc35071d031b03df465f66180bc09c8d3459e6cb0dfccc39
-
SSDEEP
1536:Rgq+BDOzEdgBF5rjPL3+agGlQHS9EcwWmryDxoTuHDoQ/ECMNfmUBHQB0+u8DyD6:izqEdAfL9BnY17c/cl6BTTJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9704e1c7c66ff55edecf06bb4283d979_JaffaCakes118.doc windows office2003
KEEibrmckjQiP
KlbsIzDzno
mfwhDbJzaI