Behavioral task
behavioral1
Sample
6ee7ca73b2a8f7ebbdc702a584a6ab4a_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6ee7ca73b2a8f7ebbdc702a584a6ab4a_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
6ee7ca73b2a8f7ebbdc702a584a6ab4a_JaffaCakes118
-
Size
132KB
-
MD5
6ee7ca73b2a8f7ebbdc702a584a6ab4a
-
SHA1
7823d19d694e0d87f328cab903a1ab9631bfd327
-
SHA256
561a3a5269e77e0789555a8791fe2d0b51f4e43607fc58ad02c60cf3aad8b5e1
-
SHA512
3f20695422d87696b7f6c2d04a590c91a7d31e08aca1998df10d9a2c70456a9c9a43fb8d182646a5ee292ed3cb9a5a9db90221414a73d448af470e1ce8904bbe
-
SSDEEP
3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
6ee7ca73b2a8f7ebbdc702a584a6ab4a_JaffaCakes118.doc windows office2003
HXbEGlvJu