Behavioral task
behavioral1
Sample
0d2dc647beec41ed1bbfa98e6dad286b_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d2dc647beec41ed1bbfa98e6dad286b_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0d2dc647beec41ed1bbfa98e6dad286b_JaffaCakes118
-
Size
84KB
-
MD5
0d2dc647beec41ed1bbfa98e6dad286b
-
SHA1
9d9bd583a9d2f66be227d5adcb777620143c97bf
-
SHA256
7f8aec95699ba129406c6d469a139cfd54ac9c0397276e74ebbcc14d1768053e
-
SHA512
0cec1ab11156760e524f0fc062e449de63c90a12700771d309addfacf9848fd70053b673625c5b80deb2fcc24d79ef0c6744c6386f839dc6796b85054854a830
-
SSDEEP
768:NpJcaUitGAlmrJpmxlzC+w99NBs+1o0Tin981ZmtRkd2kI1IZdPcZI6QF9mMg/:NptJlmrJpmxlRw99NBs+a0Y/+sIZdTT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0d2dc647beec41ed1bbfa98e6dad286b_JaffaCakes118.doc windows office2003
wkmwdMaorjp
GvvbJIJYNc