Behavioral task
behavioral1
Sample
efe25c8a64d7a4f9db0f5b22b286e09d_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efe25c8a64d7a4f9db0f5b22b286e09d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
efe25c8a64d7a4f9db0f5b22b286e09d_JaffaCakes118
-
Size
73KB
-
MD5
efe25c8a64d7a4f9db0f5b22b286e09d
-
SHA1
19ff165945ddc58acd6836511426fdcf03945daa
-
SHA256
9939b33af4f5e167653636fb280ff8c2f8e12db91a5911e611768eb3874450e6
-
SHA512
b3a9d028cf296ccc819584b6072d28203b369f1f1efcfad7a8f7b8a0fb0a3525628bb52a57ce30ce60b87d4c5fad69b416a64f0ce4839f34a706b6687bfa474e
-
SSDEEP
1536:vJK+lhLocn1kp59gxBK85fBt+a95jduedt9+d5paxyNQ:vJbla41k/W48zjduedt9+d5paxyu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
efe25c8a64d7a4f9db0f5b22b286e09d_JaffaCakes118.doc windows office2003
aDjEsPp