Behavioral task
behavioral1
Sample
f6f4b0d93d491e8a96966837bed913cb_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6f4b0d93d491e8a96966837bed913cb_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f6f4b0d93d491e8a96966837bed913cb_JaffaCakes118
-
Size
170KB
-
MD5
f6f4b0d93d491e8a96966837bed913cb
-
SHA1
c0475dc7a0ec8284930e4ecfc88c82c8259aeba1
-
SHA256
2bbeb3f4b66d9009c73d09e36468166ec3b0f6d465b3d6b5a26ddfc067a4a8a5
-
SHA512
26f3c25c772425e09ea19ef917acf47de139546a2b76eb8d67e2e67ebf3e8718d0f4357e1e0d0dd2e1f7aa76855b16d5cb1248752145d39f8ef8a02281f9ab6a
-
SSDEEP
1536:QTxjwKZ09cB7y9ghN8+mQ90MTI+adsuSh2/4XpW2AahOu/SNaneiBQjSUpUD5FZ1:MxjnB29gb8onNub/yU1amvPwXC11gGW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f6f4b0d93d491e8a96966837bed913cb_JaffaCakes118.doc windows office2003
ZnRndqwqqYSRnq
KUQXGFnNOBkiE