Behavioral task
behavioral1
Sample
adb5f80b1bfbcf5dc66cd713485f4436_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adb5f80b1bfbcf5dc66cd713485f4436_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
adb5f80b1bfbcf5dc66cd713485f4436_JaffaCakes118
-
Size
123KB
-
MD5
adb5f80b1bfbcf5dc66cd713485f4436
-
SHA1
d1774bdb9737e28b079cff487fd0e2a9a3397fa1
-
SHA256
05dc7c3a91d9402c426865acdedbc42e4a691f4e328b401ed4ecbe483e077483
-
SHA512
9dfda4d0dd2e06e380f14beb9360e86d36ae2d1ae772a6d55897304c4f4bb12d5d029c6442c9e4301c313dc20c0a200e2b6755e6cbc03c07a2b7839893c7fdd0
-
SSDEEP
1536:MptJlmrJpmxlRw99NBq+aX2H9LfB9fiChFDn3fNDBSwfuYC+a:Mte2dw99fF6qFPNDBYP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
adb5f80b1bfbcf5dc66cd713485f4436_JaffaCakes118.doc windows office2003
oIkdvbi
iRVUSIA
PhvGcsVjFjwRu