Behavioral task
behavioral1
Sample
cea90ba4c3a5a4c0baf4efb49635416f_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cea90ba4c3a5a4c0baf4efb49635416f_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
cea90ba4c3a5a4c0baf4efb49635416f_JaffaCakes118
-
Size
109KB
-
MD5
cea90ba4c3a5a4c0baf4efb49635416f
-
SHA1
609bb5bff29a2026743f291dfaac24fdc803cccc
-
SHA256
0efce5fb953be71fb03a8bed3ebbf18b0aca700af943acc6d7c5c6520692ed00
-
SHA512
d19bc7a47385e9feeb1f4b81b94b0bafcb964e9f5186289daaa878f5462fb854dd5d29a9c307f36754df3d5d1b4ec01c0f61dd3a2a76eeeec323714d0a07c398
-
SSDEEP
768:ABth9csTk6tWdmUx7mOUPwAy91LSi4TSUaThfFltvDAxz99ghEZ:ABpvkscv7mvPw5qi4TSlThDtvDA3K
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cea90ba4c3a5a4c0baf4efb49635416f_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros