Behavioral task
behavioral1
Sample
a3f4d415125cdd30848e83e5ed1836c7_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3f4d415125cdd30848e83e5ed1836c7_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
a3f4d415125cdd30848e83e5ed1836c7_JaffaCakes118
-
Size
140KB
-
MD5
a3f4d415125cdd30848e83e5ed1836c7
-
SHA1
8512ab1772c103842226c7b840095af3f0582cf9
-
SHA256
89f48022f313bb1d9d506eb331abea11986e26cc971074ca4880a33306aef311
-
SHA512
31feba058108a80af86e75e378e480ca45b4f27829fae1b28efb1a4494ab4417c144646055e2893d11b68c3af725b39de4b8b87db4d00e0c3270154706935672
-
SSDEEP
3072:wTTTTTcn/iKF+rx0o7t8qIzG1PRfEluu6qToxZYP2CH2w+X/r5pEG5nY:wTTTTTc/iQUx0uCqgGDfr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a3f4d415125cdd30848e83e5ed1836c7_JaffaCakes118.doc windows office2003
ThisDocument
DNGhKTqMjkB
GUwhPFbhohYwpl
PpkmwMdbtv
LBwcVFWPUlXLs