Behavioral task
behavioral1
Sample
d3e04cf20f65adc2ca1e286c992b5ec2_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3e04cf20f65adc2ca1e286c992b5ec2_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d3e04cf20f65adc2ca1e286c992b5ec2_JaffaCakes118
-
Size
142KB
-
MD5
d3e04cf20f65adc2ca1e286c992b5ec2
-
SHA1
127a87e427fc5f238ed5f10f1944a83513554038
-
SHA256
32e58a167f86f12f049e4a387cff6082a600f0394cfaa2cf8a8e68f5f5d16bb4
-
SHA512
636af1f762b5aa0d6104dd0e0c7aef77ef99a6dc675937343f25cedd594fa045ef4836fb8566bbd3cd8f2f31960fc903e60fdf576608ce6dc1316c15d6840947
-
SSDEEP
1536:3J81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvad4+acN99QnzuWqmOid+:58GhDS0o9zTGOZD6EbzCdxQzuCOiY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d3e04cf20f65adc2ca1e286c992b5ec2_JaffaCakes118.doc windows office2003
GHlvGiLjQZRfJI