Behavioral task
behavioral1
Sample
b3c463033af67e9225016f6cba6a5f1b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3c463033af67e9225016f6cba6a5f1b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
b3c463033af67e9225016f6cba6a5f1b_JaffaCakes118
-
Size
232KB
-
MD5
b3c463033af67e9225016f6cba6a5f1b
-
SHA1
da975fdceca9fc057f1138c3c25cb62370044a42
-
SHA256
c8cfe845de49e0dbc52e306ed2be01f67eee457628f2bf93082ec6b15853197f
-
SHA512
7aee050a6fe3c07f1335a639a3b5d126f28667c99665f2f3c016ac288dca2e0ae212f0aa11b9d1bf28e4b4a94357464bb28d03600ea85746cceb1a0413516ba0
-
SSDEEP
3072:tH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5EyXJm9YBmjDwy7D6tGff:tFVeEsjdXRC3jexGG6TYWofwyv6tGf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b3c463033af67e9225016f6cba6a5f1b_JaffaCakes118.doc windows office2003
bGQHJKU
msbilcAZjT
kMGQLqGH