Behavioral task
behavioral1
Sample
fcd0876b1f82c246ff0d07f7e6a4e37d_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcd0876b1f82c246ff0d07f7e6a4e37d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
fcd0876b1f82c246ff0d07f7e6a4e37d_JaffaCakes118
-
Size
84KB
-
MD5
fcd0876b1f82c246ff0d07f7e6a4e37d
-
SHA1
4b44a9eb9c4d69bc19e6f931c6aaf1504acba02f
-
SHA256
4c10ebf2339186ba1432a006b9062f41992017fb2578820fd08d29c5bdc9f8a6
-
SHA512
e43412b817bdd4662cfe592ea656d1fa1b9feb67f54c0964185dc7699f87cc435c049838ea5934f9fb33e789eea9469c965016b0e7cb69ebb9ea72f849564056
-
SSDEEP
768:ZCVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBx+1oadzX5k2i4gz+OFs2QDj:ZCocn1kp59gxBK85fBx+aa9i4bl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fcd0876b1f82c246ff0d07f7e6a4e37d_JaffaCakes118.doc windows office2003
DsrfknT