Behavioral task
behavioral1
Sample
33fbab695ac5ef73d7f3e69aa03dc16a_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33fbab695ac5ef73d7f3e69aa03dc16a_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
33fbab695ac5ef73d7f3e69aa03dc16a_JaffaCakes118
-
Size
65KB
-
MD5
33fbab695ac5ef73d7f3e69aa03dc16a
-
SHA1
d30f09eaa835d85726ae8cdb39c1667b3378e953
-
SHA256
b0703f2eb3d4e5a3e280963eeef0046a54474923da2263796f99e2e5bd5d6716
-
SHA512
bf3788d4dca7b13d1482177888227415bf5e605c47076cebbb675269b676cc892a7c940bd2763f4197803e4e16f244a25a49a7da23dbefc414ae9f034ce17b6d
-
SSDEEP
768:8pJcaUitGAlmrJpmxlzC+w99NBD+1onW0UzY4j8NrcBYbhn8R:8ptJlmrJpmxlRw99NBD+ansc8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
33fbab695ac5ef73d7f3e69aa03dc16a_JaffaCakes118.doc windows office2003
OkVlhQFqzKskz
WQujRVwwzsiSCT