Behavioral task
behavioral1
Sample
a9adedec9b6b4c1406ed26b28182bdf1_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9adedec9b6b4c1406ed26b28182bdf1_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
a9adedec9b6b4c1406ed26b28182bdf1_JaffaCakes118
-
Size
44KB
-
MD5
a9adedec9b6b4c1406ed26b28182bdf1
-
SHA1
2391cb76b50c4811f4324a2710e860e7845e06d1
-
SHA256
892e130519f1ddf7759532553d72a74bb2e9247f475f8dc52d057d89996e0585
-
SHA512
d59e09e6a5d36dede4c0fe97a2a339a7cd6761a3944ff0d5138141a01d2f320356213f182b123dd4409a7e3c37989d0f2fa3a95d2daeeb8bb5514352b1c0ccd5
-
SSDEEP
384:wEi8iSUR/8dAuqNLi08krRuHzQjbuMZZzkExygcPEdEsKhb2YOPygBP0jIutA:G/qlaLiEjbZZ19yhEd6yPJNT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a9adedec9b6b4c1406ed26b28182bdf1_JaffaCakes118.doc windows office2003
ThisDocument