Behavioral task
behavioral1
Sample
e248ed2a70cc4ebf26840bd5af60d617_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e248ed2a70cc4ebf26840bd5af60d617_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
e248ed2a70cc4ebf26840bd5af60d617_JaffaCakes118
-
Size
81KB
-
MD5
e248ed2a70cc4ebf26840bd5af60d617
-
SHA1
1886e0513a9f74ab12cf68a00e15054ed55054b9
-
SHA256
8dab9e03e0814ce4b5f8845e66398a28a79f82f2cb37541f44fe5fdecd817759
-
SHA512
a116085e3725bb0d9af9e5724c5678de2f32028a984f8eba9cd3d5620409d20466dd56de8f6a39a1ad17e3ff293961de5ce210cf7fde81ec8ee8efa8c5df7e27
-
SSDEEP
1536:lptJlmrJpmxlRw99NBD/t+alqtmmUZ/tiwp613rvDaHwwle:bte2dw99fD/LqtmbVp6laT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e248ed2a70cc4ebf26840bd5af60d617_JaffaCakes118.doc windows office2003
znLKzJzoudlYA
ApWzUKnRosNSQ
YBEISfwZXXh