Behavioral task
behavioral1
Sample
a788e80e8e6c307e23d52bfc0ee0773a_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a788e80e8e6c307e23d52bfc0ee0773a_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
a788e80e8e6c307e23d52bfc0ee0773a_JaffaCakes118
-
Size
157KB
-
MD5
a788e80e8e6c307e23d52bfc0ee0773a
-
SHA1
74ab701c25070285a0c90b802641585f3a87121e
-
SHA256
ec35c865bf8800c7c181f7d32eaf0ac18c1722706483e99f43e33fe16ff3ff8a
-
SHA512
97ae4d93b97e674258d3c9ec3e009b7fc4f5d595de02fa9c61ed96e48c47b68d49e8980443bebfb8c05a2514084e005b65e34dace165cd17b05cc495e1a21c0c
-
SSDEEP
3072:WFiV0zJjiN3ljS52R9yYZzSljw5KlAThn9t7Cry9ZwGylobUB5BEc:WW0zJ2N3RSLYZX5nnn+2U1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
a788e80e8e6c307e23d52bfc0ee0773a_JaffaCakes118.doc windows office2003
ThisDocument
ggCs2Jcxp
i0QbHuhZ
KoNADrm4
f