Behavioral task
behavioral1
Sample
d3d2ae27c9649a16f377dbfa77267799_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d2ae27c9649a16f377dbfa77267799_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d3d2ae27c9649a16f377dbfa77267799_JaffaCakes118
-
Size
56KB
-
MD5
d3d2ae27c9649a16f377dbfa77267799
-
SHA1
248dfb0ecd130f315b280bda96b157a5f781b0c8
-
SHA256
348e28e2018a9ac18b568770536f033564ed1ebc5c16c4444be83a1c6f68b5ce
-
SHA512
871cbb4fb15a8af9b02897eab04923298a46034faea2ebfe4ed012012f7e493d155ada135228e95c80fc41a9e549c8862f41ed51d4afa4093b715e4e19d3f3fa
-
SSDEEP
384:YIICXu28TjCuZM/5evJy5bHASnFjZuWQbCdTWy4ArN6szRechBjD+XtF9D9K:YVCXZ8iUs5EJAHjFjZuBb4yyuERfyT9E
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d3d2ae27c9649a16f377dbfa77267799_JaffaCakes118.doc .eml office polyglot
ThisDocument
NewMacros