Behavioral task
behavioral1
Sample
98754cd7f73b70f56c62f733d8695ede_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
98754cd7f73b70f56c62f733d8695ede_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
98754cd7f73b70f56c62f733d8695ede_JaffaCakes118
-
Size
88KB
-
MD5
98754cd7f73b70f56c62f733d8695ede
-
SHA1
81bd37fce137b48d1c50540677e4cdbdf539062b
-
SHA256
d46ce60c64b86fc1f9045433312e3b251c8da46ac1e1372db72c9595461e3b9f
-
SHA512
6a0dbb8d8b5cdb1cba8fe13d9d7eab255da95dc9f3c0dfb0cd86436bfa7290c8e00f41c8a6edb618e3a76ff25b0252285308ee058474b14775335c915b80c6d2
-
SSDEEP
1536:lptJlmrJpmxlRw99NBD/t+alqtmmxZ/tiwp613rvDaHwwle:bte2dw99fD/LqtmYVp6laT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
98754cd7f73b70f56c62f733d8695ede_JaffaCakes118.doc windows office2003
znLKzJzoudlYA
ApWzUKnRosNSQ
YBEISfwZXXh