Behavioral task
behavioral1
Sample
6fa2bb98b984211dca440babbf79b9f48ab4f0f157818f832f94de22ffaea448.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6fa2bb98b984211dca440babbf79b9f48ab4f0f157818f832f94de22ffaea448.doc
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_feac72c5c4a55ae02c6e324a7f0a0dd0e2b37eba7e443db424f4fef1d46ae909
-
Size
18KB
-
MD5
e77ebaff9141cc9afee09d9a1e58a461
-
SHA1
1633fcca31b003d68979652eb9e0bc417c871b20
-
SHA256
feac72c5c4a55ae02c6e324a7f0a0dd0e2b37eba7e443db424f4fef1d46ae909
-
SHA512
0f2f9f400c250fa3779a73a16d5359631f49d96f0196324aae32971934aca5db80a314742a86d0b1df3839ec9c861c5d0ec51d9946483e4aec4a80c7719e3657
-
SSDEEP
384:tjofxyT4QyBfsr1ktrcX2RRzI1ttPMjIiRmNxy0fAS:tjoJy8BCrScGRwY2xy0b
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/6fa2bb98b984211dca440babbf79b9f48ab4f0f157818f832f94de22ffaea448 office_macro_on_action -
resource static1/unpack001/6fa2bb98b984211dca440babbf79b9f48ab4f0f157818f832f94de22ffaea448
Files
-
JaffaCakes118_feac72c5c4a55ae02c6e324a7f0a0dd0e2b37eba7e443db424f4fef1d46ae909.zip
Password: infected
-
6fa2bb98b984211dca440babbf79b9f48ab4f0f157818f832f94de22ffaea448.doc .vbs windows office2003 polyglot
ThisDocument
NewMacros