Behavioral task
behavioral1
Sample
d1fbfd6ab67da6904ec6224ffdd244f1_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1fbfd6ab67da6904ec6224ffdd244f1_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d1fbfd6ab67da6904ec6224ffdd244f1_JaffaCakes118
-
Size
76KB
-
MD5
d1fbfd6ab67da6904ec6224ffdd244f1
-
SHA1
499fd47722b889faecd492e32448c8c8708d4bb3
-
SHA256
584e69e73f88a5e18c646a421bac4c0ecfeca03bfe460a85c851f739a6d28b0f
-
SHA512
7c11fa773f8267548bf6646f8f0936761448626059ad4cb1994687b22d8004712f4b7c28253393bdf8f9be39c461632faf1eed5863bad7a75719b52c501289a3
-
SSDEEP
768:bpJcaUitGAlmrJpmxlzC+w99NBN+1o+AT8yeIq1GzU4NB/TCGZNj:bptJlmrJpmxlRw99NBN+a+SBo4L+4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d1fbfd6ab67da6904ec6224ffdd244f1_JaffaCakes118.doc windows office2003
CYtijPIj
AIzIYrDULpj