Behavioral task
behavioral1
Sample
ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ed97ee2d08454ed55047538abd393544_JaffaCakes118
-
Size
178KB
-
MD5
ed97ee2d08454ed55047538abd393544
-
SHA1
fe69c392b19223592be202974552818de8abd2a9
-
SHA256
256e95b41be42509e33cfd8730065c8ba6722d46523518a41f605169ce22de69
-
SHA512
a0c24a1015c5fe7eae785893c76da3073687e3d2eb8e72e7db73ee043c84c2207ee535620e133bb1ec167045fc1fec6607d057c9813d42d7c76c5ebee5813fc6
-
SSDEEP
1536:4DNVczHkD9icmT+FFdZ+a9BGy4+qiQSLxSBAN0Zg+Zfg9ZchEZP5dIHwMa1vgwKQ:4Dn/iKFf4uOZ6wMwU1cUScys/GO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc windows office2003
ThisDocument
SWdjaVBbI
KniXPAMYdd
aQzHfNFv
CUKtkavDpAi