Behavioral task
behavioral1
Sample
0fb6aa6bd2c55de484eb1f9e1341b8c8_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fb6aa6bd2c55de484eb1f9e1341b8c8_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
0fb6aa6bd2c55de484eb1f9e1341b8c8_JaffaCakes118
-
Size
79KB
-
MD5
0fb6aa6bd2c55de484eb1f9e1341b8c8
-
SHA1
9b1f238b0f3512c4313b6d65d65c7363cdfb1eb9
-
SHA256
f58c3b199cdd3874d180e02b17bec21e76baf920926690df5e68a3b15872bbc4
-
SHA512
7fe71e13732ab383be41d44135b9d482e46ee42e1930a6f50f16cfa66afab9b1fcb7628d8584af7142902b021c3f2746ded326f6d005318ec8879778ea7f39da
-
SSDEEP
1536:cptJlmrJpmxlRw99NBx3B37+aFg3v3S18OHZFP9Ssuase1jS:8te2dw99fx3B3Fg3v3S3HPfl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0fb6aa6bd2c55de484eb1f9e1341b8c8_JaffaCakes118.doc windows office2003
AIIfUddBvsC
mTDiVPJjjQLbi
aPPnsUziqWni