Behavioral task
behavioral1
Sample
118c9c9cb824cbd4e27e56a4636fa6da_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
118c9c9cb824cbd4e27e56a4636fa6da_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
118c9c9cb824cbd4e27e56a4636fa6da_JaffaCakes118
-
Size
223KB
-
MD5
118c9c9cb824cbd4e27e56a4636fa6da
-
SHA1
4d7a8555275abc6ffd093106038620a93860dd65
-
SHA256
6494c1c3e9e6e9a2d5935c2b40b1243b5f5e308a94b100e8209e358b5617b097
-
SHA512
a7c260f48c137fc0029c5e7831024f7c55a229c34202e729ce3aba34a8e55851fbd73ca62a19341fce01b84b157df8b52b717359faefca1e5fc342abf9fa8933
-
SSDEEP
3072:EH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5WyXJm9YBmjDOj8rps:EFVeEsjdXRC3jexGG6tYWofNs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
118c9c9cb824cbd4e27e56a4636fa6da_JaffaCakes118.doc windows office2003
rVXlinhiLiVaC
sdnporjcSwRrTO
FFzlnPOK