Behavioral task
behavioral1
Sample
fdd928a950c89bd0e0f6a5deb7beff22_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdd928a950c89bd0e0f6a5deb7beff22_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
fdd928a950c89bd0e0f6a5deb7beff22_JaffaCakes118
-
Size
119KB
-
MD5
fdd928a950c89bd0e0f6a5deb7beff22
-
SHA1
5c2fa493310c22b42e25aaec2d3b2676dc67bf0a
-
SHA256
993846759d53b104e7667c4de58d198126965856f30b52a61009790941988199
-
SHA512
be8686fcd9543c09064b2b9929ffb8296e6ce11c4aa6a28d6d76c2697fffd53ebd28f0bcdcbbf08e8d5894c1554b03d3371dd6b52ee986af57b0bbe53cdb37c5
-
SSDEEP
1536:WTxjwKZ09cB7y9ghN8+mQ90MTF+aI/Ok+2PmQ+aQ88nbDr2:uxjnB29gb8onDk+2PqbG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fdd928a950c89bd0e0f6a5deb7beff22_JaffaCakes118.doc windows office2003