Behavioral task
behavioral1
Sample
b0d884351fe4e785900bc817ce0394a3_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b0d884351fe4e785900bc817ce0394a3_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
b0d884351fe4e785900bc817ce0394a3_JaffaCakes118
-
Size
64KB
-
MD5
b0d884351fe4e785900bc817ce0394a3
-
SHA1
0eabf1b820d63bf7b82e1eb020d0fd302bad861f
-
SHA256
38193dbbd31cd07d689fccf4f9be88de1320dd6c4d4457e9347ba6c0b229835b
-
SHA512
333a283ecf963348e583f3dc9a5ac79f3e7c30c0976edfa8ee3b541267756e61e78829819207028eb61721f9bb5db06a7ac3f74f9e24f4dd2db25b94723101a8
-
SSDEEP
768:rZtnEUu6Ofve6CRYvkvQ4ay1aa74EOhRbF3my/d/wCndsevIr6ox6:rrEUXOfvenRBo4oiKLbwGS6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b0d884351fe4e785900bc817ce0394a3_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument