Behavioral task
behavioral1
Sample
0a608f1beae1b403ed5fc02b4a48595b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a608f1beae1b403ed5fc02b4a48595b_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0a608f1beae1b403ed5fc02b4a48595b_JaffaCakes118
-
Size
108KB
-
MD5
0a608f1beae1b403ed5fc02b4a48595b
-
SHA1
49c9de20ebb42d63129398e2ace384c63767a638
-
SHA256
72e9c2d25c8c83cdcecf14f7743dea3c28b4c3212a7d9751ce9f5896ce053666
-
SHA512
333a877e3ddf798337f6c4e12e3330278a264cef2351bbcb382822cb1d59cf97dc5ea43d5d1214fd83b7f99761579403d5fb6cbbb6eadf51f84cf6e9f018f94f
-
SSDEEP
1536:dptJlmrJpmxlRw99NBP+aO1Yrb+yXTYeef8hilJ+BqLkXJwivrfjv8:Dte2dw99f8Y/vT88hcJewgU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0a608f1beae1b403ed5fc02b4a48595b_JaffaCakes118.doc windows office2003
YFhZtHrzUbu
NNqGuJcpWQHclO
JcjCQLAbjkw