Behavioral task
behavioral1
Sample
9c132fded67c2138b508f154a52d9e4d_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9c132fded67c2138b508f154a52d9e4d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9c132fded67c2138b508f154a52d9e4d_JaffaCakes118
-
Size
82KB
-
MD5
9c132fded67c2138b508f154a52d9e4d
-
SHA1
cbf08c0bd98442acddc2434b0342811931738679
-
SHA256
b66c2d2648e3a3736b78f0a76a9b7a6c873e0b2650618dc24e197cb4a0b94507
-
SHA512
ff8b228ee2fff1ed4a277f5eac864ff8317c2ac704019feff8cefcfe01cacd9cfc5e7f7c0e6592a743124016d92b352b7ff9a123858496f6be2fe7e5e4c7450f
-
SSDEEP
768:YR63mWVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBG+1onc19ZdX14JC3ldgjD9:YR63mWocn1kp59gxBK85fBG+ankvm39
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9c132fded67c2138b508f154a52d9e4d_JaffaCakes118.doc windows office2003
LjVRCKji