Behavioral task
behavioral1
Sample
33e846e8b48013fef09bf9292dc7978e02a5b6ac.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
33e846e8b48013fef09bf9292dc7978e02a5b6ac.doc
Resource
win10v2004-20240802-en
General
-
Target
b18b1f5c08c75f082d16d693cce2dc33_JaffaCakes118
-
Size
50KB
-
MD5
b18b1f5c08c75f082d16d693cce2dc33
-
SHA1
802c2e53f3605dfb8ed293723bc2e6f2c077e1e9
-
SHA256
02c595b4dd524ebb9c305484ff015921311eca127f84cfac50ac23021af87db4
-
SHA512
c269071239d1382f852353a92753aeb3ec8c8e8d4c67922a6c7c87d55862d3b37b4f18c8d7905c1f08f95581755d85beabb9c6dec805cbd87e95615add387dba
-
SSDEEP
768:O+vwOoKE8sTd6jXm4MBNJTvObcQ50wl1c/JQe6Q1SdPUTYXenxwfYrzWO/RKzqGk:1Cv5oX5iT7+0c1i8Gien2qzWO/RKudP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/33e846e8b48013fef09bf9292dc7978e02a5b6ac.doc office_macro_on_action
Files
-
b18b1f5c08c75f082d16d693cce2dc33_JaffaCakes118.zip
Password: infected
-
33e846e8b48013fef09bf9292dc7978e02a5b6ac.doc.doc windows office2003