Behavioral task
behavioral1
Sample
fd0194d048bd583ff3eca5f08979e1d1_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd0194d048bd583ff3eca5f08979e1d1_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
fd0194d048bd583ff3eca5f08979e1d1_JaffaCakes118
-
Size
80KB
-
MD5
fd0194d048bd583ff3eca5f08979e1d1
-
SHA1
862b6ff80a75b3082fe5dfed5f0dd60616accfe5
-
SHA256
0babccad8aedd7a7f01ec4c197f750c1231408bad32725a4c15d3c19c3db0574
-
SHA512
8cdb472630c8e03436015518da08dd9b4affa74ec0ded8c432e32a5260b27e866077bd3d919f5519001c5e357a9d959f17218d9912f68b9d82724da0aed9a754
-
SSDEEP
768:zpJcaUitGAlmrJpmxlzC+w99NBs+1o0o1X9810mtRkd2kI1IZdPcZI6QF9mMgb:zptJlmrJpmxlRw99NBs+a08i+sIZdTT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fd0194d048bd583ff3eca5f08979e1d1_JaffaCakes118.doc windows office2003