Behavioral task
behavioral1
Sample
f522d164eeb64baad76e65abca6c48ff_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f522d164eeb64baad76e65abca6c48ff_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f522d164eeb64baad76e65abca6c48ff_JaffaCakes118
-
Size
162KB
-
MD5
f522d164eeb64baad76e65abca6c48ff
-
SHA1
40a4472f211c3559819ec32d1c4a078e618f1a3f
-
SHA256
a888e5c780c2139c851c0c17a327b40545c10a5ed56caaad7d844244217e4ca6
-
SHA512
d7266fa2f66a42721492275b604d724e8df3d74dcc40465edaa46830b557a8d032800179a98f22b3435c524de882b3865e72051201b1b77dd891cd5dd1d56d6d
-
SSDEEP
1536:WTxjwKZ09cB7y9ghN8+mQ90MTF+aIlOk+2PmQ+aQ88nbDr7+nfkvBvzQJ8S1gi/u:uxjnB29gb8onZk+2PqbqGvz+1pu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f522d164eeb64baad76e65abca6c48ff_JaffaCakes118.doc windows office2003
jovqOBvRlNiVR
YaRCzHvjhlTcHt