Behavioral task
behavioral1
Sample
c8751f859164adcf912cb24e82c789cf_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8751f859164adcf912cb24e82c789cf_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c8751f859164adcf912cb24e82c789cf_JaffaCakes118
-
Size
266KB
-
MD5
c8751f859164adcf912cb24e82c789cf
-
SHA1
1f807f801ebfc5196df40fd67a9f106a7d969e66
-
SHA256
4f19216fe92e3b4d36d6803561d0b202ebd50795ea841c4367f8e27fb5d15085
-
SHA512
3d0f59bca5b000fc844cacb46a43728e19a6d840ae112f6c985a1a5754acf13121ab53ea70142198e7aa30c2bbf93b2947bc999de309ee5a0d5a2da7f14d9a18
-
SSDEEP
3072:VkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYCUB5BEiudV:VCwQK3RpVS7G4SVuz1QzLhxztsZGPwa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c8751f859164adcf912cb24e82c789cf_JaffaCakes118.doc windows office2003
ThisDocument
sIpNl0ZEt
iDiyq
NoRnJ
f