Behavioral task
behavioral1
Sample
9e531e5923255e42d0102eaffc242ccc_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e531e5923255e42d0102eaffc242ccc_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9e531e5923255e42d0102eaffc242ccc_JaffaCakes118
-
Size
49KB
-
MD5
9e531e5923255e42d0102eaffc242ccc
-
SHA1
92756fc6fc8933cc8b0a94e287fe000b77febc79
-
SHA256
30e03f2486ac0d7b845f4e1163fc7c947d548f7e4598fd709202bcda662dc443
-
SHA512
83beaf6b520758a16c080773abbe9360d472217b1940d7d1c930d4ec4363eb410e9b647b90b433a32c6a0f77f4dc9837e12f24c32dd601477dfaeed30051da89
-
SSDEEP
768:rHoIFRxZXlvAvqSrj021GjlSI4fV4v0FKCO4cKCYNWKn/7:rHoIRvAvd0TsImVzFNcKCY4Kn/7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9e531e5923255e42d0102eaffc242ccc_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet4
Module1
Module2