Behavioral task
behavioral1
Sample
f5d3ca8c627a7f1c30aecfa3553bfb88_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5d3ca8c627a7f1c30aecfa3553bfb88_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f5d3ca8c627a7f1c30aecfa3553bfb88_JaffaCakes118
-
Size
136KB
-
MD5
f5d3ca8c627a7f1c30aecfa3553bfb88
-
SHA1
5f2b8c81e9ab7258814a6c6bebbdf78eb4817112
-
SHA256
7dd66e46230910c82ace05f4202de37348aa956232ebb54dd7f75329f513af9f
-
SHA512
827c4559d4575ec7b2039077fc83de8f63bc2f59b390024be44274adb0e85cc05f3b663670ffc19f4310f145a36d7be1177c3116f2b92702b85b730bf77394d5
-
SSDEEP
1536:3J81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvad4+acN99QnzuWqmOid+:58GhDS0o9zTGOZD6EbzCdxQzuCOiY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f5d3ca8c627a7f1c30aecfa3553bfb88_JaffaCakes118.doc windows office2003
GHlvGiLjQZRfJI