Behavioral task
behavioral1
Sample
06e0998e9c8ae7ba03cf2c5e10c3a2c9_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
06e0998e9c8ae7ba03cf2c5e10c3a2c9_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
06e0998e9c8ae7ba03cf2c5e10c3a2c9_JaffaCakes118
-
Size
115KB
-
MD5
06e0998e9c8ae7ba03cf2c5e10c3a2c9
-
SHA1
e144ed0a39d7b2f71fd1f29a3e2a6cd97a6db4a3
-
SHA256
31a8593b18120bcd4f5060bbece6be1396e158ba439b8315a22774dda3e98413
-
SHA512
cf9bface8227dca4432f6f33ec4249186095ff7def63f5dd15c7690695d9d0c9feefcaac3a8fc394f8c9ba2f7c1dd4e21866e1a5a3eb2dfcecd49481a1ee2375
-
SSDEEP
1536:mAG1udvDu3xv+pekyzdJNWiKuBGjsJIGgVawLkRyvj:HGwd8GCWSIGQawLi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
06e0998e9c8ae7ba03cf2c5e10c3a2c9_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros