Behavioral task
behavioral1
Sample
d222dd8769142f481091cb1ddf23e71c_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d222dd8769142f481091cb1ddf23e71c_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d222dd8769142f481091cb1ddf23e71c_JaffaCakes118
-
Size
72KB
-
MD5
d222dd8769142f481091cb1ddf23e71c
-
SHA1
86c8fa140305aeea775aa5fdb5c85e1b7ae7adf2
-
SHA256
ff36c4eedb27dd16d1417e177d651b4e5e746c388b5f08dbe9bc9e308a1d6d64
-
SHA512
236d5a5745c3f1ee59cc1eaea132ecfd29b7915a5a2b82d4ef5a2189ee4c4fee5b7124d3cc3b39e6bc99e9bce00a790922427f3e3ef7fe6ccb1b8ca3f6cfd2d9
-
SSDEEP
768:9pJcaUitGAlmrJpmxlzC+w99NBqq+1oZX1Wgxbqf4nms+GLoF+c/Z:9ptJlmrJpmxlRw99NBD+aZw74nrV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d222dd8769142f481091cb1ddf23e71c_JaffaCakes118.doc windows office2003
NBoYqjWaZ
NjwlcZFjnP