Behavioral task
behavioral1
Sample
faba0ba2d47bb59d5f8d63fd610c5e31_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
faba0ba2d47bb59d5f8d63fd610c5e31_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
faba0ba2d47bb59d5f8d63fd610c5e31_JaffaCakes118
-
Size
171KB
-
MD5
faba0ba2d47bb59d5f8d63fd610c5e31
-
SHA1
6218521dddfd42fe44228527d59f093401b5b8cb
-
SHA256
00fd8c30c2b05d4d7e4d910d881e8b7c6694478abda7eb3c4ba5917c8fd6e437
-
SHA512
04bc1c03a54a79a738aaf0df1e89fb4868797e453e83664fcc18d06297bfa03f20cc887fd72c31402238a2947f50cf7a9ae8750855a501f67b458440e56ad3ae
-
SSDEEP
1536:QTxjwKZ09cB7y9ghN8+mQ90MTI+adsZSh2/4XpW2AahOu/SNaneiBQjSUpUD5FZ1:MxjnB29gb8onNZb/yU1amvPwXC11gGW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
faba0ba2d47bb59d5f8d63fd610c5e31_JaffaCakes118.doc windows office2003
ZnRndqwqqYSRnq
KUQXGFnNOBkiE