Behavioral task
behavioral1
Sample
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118
-
Size
29KB
-
MD5
ed3b0943b223fcad9d78973af5410fa3
-
SHA1
6d78285c8092121ecd65195c03aee430bad8013a
-
SHA256
b15d63681c17e2aad8ae6d656c451ed51d4116345513c288b0127fbdebc60f02
-
SHA512
1d296539f4d6568dbbde8e3cdc08e0221860cb02e199e081b81b0ee1624eab6c7e208ce939c2ff827a79881f6bf12d2d2eb3384372ecd1e2123e376711838672
-
SSDEEP
192:w4NslLZEvA+6/6r8px8SmvowzxM4LFs3ur9VYCD2hfuEus7a40j0pkB1t2la8:w98iS8px8SMDMtuvh6mKa40j0p4ty
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument