Behavioral task
behavioral1
Sample
07d3be8c4df887e034194eb0b16c963e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07d3be8c4df887e034194eb0b16c963e_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
07d3be8c4df887e034194eb0b16c963e_JaffaCakes118
-
Size
90KB
-
MD5
07d3be8c4df887e034194eb0b16c963e
-
SHA1
73aabccc3811c97c64505a3ad45377e0e8a99965
-
SHA256
aa9766333f3c909aef146b12b0b2302f9c898ef949f4e731cb21eb236d6a3793
-
SHA512
009fb5fb473679f7f486e7dd65b6a4b717f3166d2979fe74b469a9e41b9415c605fb93addc4ddcc95ea3d8ed33fa386ad00b8746bb5e291fc8e77cc3450c2d14
-
SSDEEP
1536:tptJlmrJpmxlRw99NBf+aHE+y134L/Ojsn/orH/Dz:zte2dw99fzy1IL/csQrH/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
07d3be8c4df887e034194eb0b16c963e_JaffaCakes118.doc windows office2003
nJmLzBXWK
NQKzJRAJmqhGjV
JuljlCOB