Behavioral task
behavioral1
Sample
d11f3f23854263dfa30b56b5b76190ed_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d11f3f23854263dfa30b56b5b76190ed_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d11f3f23854263dfa30b56b5b76190ed_JaffaCakes118
-
Size
48KB
-
MD5
d11f3f23854263dfa30b56b5b76190ed
-
SHA1
dced89810915ebbbc061aea959fa9b8befcb676b
-
SHA256
a5c526644146cc09294091b10190de61cdb48804b435cd7cb087390839a77fc5
-
SHA512
7634f0b0badd0017caa123f40353741c5286e8a4e617a9121dffeaa3a6b5dd380522e77f4531a95da2f3139cd5316140c679dca20e9365af5bf941b042a2683c
-
SSDEEP
384:OkOkiSsqdg1vA9fiD0JZhtr/zWkZj3vZRdcuZFqzPa7INsz76A0jWr:OE+1o9Elyj/tjQzPajvF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d11f3f23854263dfa30b56b5b76190ed_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros