Behavioral task
behavioral1
Sample
6acfc827bf70cfd4fc9cd36f66ebba6c_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6acfc827bf70cfd4fc9cd36f66ebba6c_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
6acfc827bf70cfd4fc9cd36f66ebba6c_JaffaCakes118
-
Size
124KB
-
MD5
6acfc827bf70cfd4fc9cd36f66ebba6c
-
SHA1
cb32b63048a1368cceb3a2114ca6fe640ee440cd
-
SHA256
fbb1873ef58fdcc8f875e6450150e7a378e86deb32cb3525fd23d3791bf192ad
-
SHA512
08fe27514c28daaaa5278ab990f84a0ceaf3075eda9d157f01739de20574a30e811b610c84a0e51cc011c875005411f041d6feabf6601895c04a5738505232ec
-
SSDEEP
1536:nptJlmrJpmxlRw99NBc+aSwT+75RnuwACdRR2XGUggBlpF7xpy7RMANuk:pte2dw99fVtRIWwYMKuk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6acfc827bf70cfd4fc9cd36f66ebba6c_JaffaCakes118.doc windows office2003
aQDwoqNjHmZ
BkuwDNzfGm
fdEGEqUtFlGR