Behavioral task
behavioral1
Sample
3dee9e3e70fd10ff39ef80830f1cc26b_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3dee9e3e70fd10ff39ef80830f1cc26b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
3dee9e3e70fd10ff39ef80830f1cc26b_JaffaCakes118
-
Size
245KB
-
MD5
3dee9e3e70fd10ff39ef80830f1cc26b
-
SHA1
e6252ff691191b0ae81259f583eaf9736285a284
-
SHA256
423015302dd3bb49177e84a5daba52e001b63069ee9293fe40f48a8c0cf92edf
-
SHA512
d22f88c0032010283c2068218a40bcc92f30f2ba98286020cbae962e6922f26319be7094b48aff9da386de2e4ca01c18a265a70a2071142a50d25390b1525947
-
SSDEEP
3072:WH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5AyXJm9YBmjDselOP3l0zTq:WFVeEsjdXRC3jexGG63YWofses3azTq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3dee9e3e70fd10ff39ef80830f1cc26b_JaffaCakes118.doc windows office2003
CBzXuqZ
TVBWWOiAtYtk
mwLtdfp