Behavioral task
behavioral1
Sample
e1966466b3dece4fcf405d16359dc58f_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1966466b3dece4fcf405d16359dc58f_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
e1966466b3dece4fcf405d16359dc58f_JaffaCakes118
-
Size
176KB
-
MD5
e1966466b3dece4fcf405d16359dc58f
-
SHA1
e1e6ae684c3a7c24c11f0d3a9ca02e36f9187c1e
-
SHA256
c225f1fe4022ffb372770f9952e1f4809cdeccab311d668482edb9b3e3373111
-
SHA512
d97009f3c2c2c6672032888af124cdfc3a1962f6b237ac59510e3702b32dfc1f6f4d6aeb47b7ed6116170d0c4ec2af7f1e777edab9037716f8db2237cc3c1725
-
SSDEEP
1536:f8EBdnrYop9RsofzoYYx+a9B0NBzqDIey91kcbZm9r1n1L5OrxnV/LQb5AO7SlXg:f8AEqqoboYNx1kWgrR8dRQ9bMXcy/7s
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e1966466b3dece4fcf405d16359dc58f_JaffaCakes118.doc windows office2003
UGFszCvRdNjL
iJYcuwtD
GKsFprkIdVw
LTilaotfr
JzqGCisD