Behavioral task
behavioral1
Sample
f6195c83d2f9bdb9e4104b80dfed2698_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6195c83d2f9bdb9e4104b80dfed2698_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f6195c83d2f9bdb9e4104b80dfed2698_JaffaCakes118
-
Size
74KB
-
MD5
f6195c83d2f9bdb9e4104b80dfed2698
-
SHA1
99a0a89b74c69831ba7f2978be0e5c9ffd4bded2
-
SHA256
107255f15e3ab7ca748bc7a8a13f746ae05556b2811cedc8717bb8fe8c390eaa
-
SHA512
3dc0a8d69200f5e8fcfbfdbcbf3f0b94a6d37215d77c8ee746c55c42e9ac8815dd1e5a9efa8dfbae822acab7862c5608d9045b3c79ff6799ca50288377f0263c
-
SSDEEP
768:npJcaUitGAlmrJpmxlzC+w99NB38+1ove9A8e3w8jZlerhc2E:nptJlmrJpmxlRw99NB38+ave9AO9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f6195c83d2f9bdb9e4104b80dfed2698_JaffaCakes118.doc windows office2003
nEHLvviZt
jISkiNGlXB