Behavioral task
behavioral1
Sample
6faf33dcd2aebb8a38e44ee3138db09e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6faf33dcd2aebb8a38e44ee3138db09e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
6faf33dcd2aebb8a38e44ee3138db09e_JaffaCakes118
-
Size
81KB
-
MD5
6faf33dcd2aebb8a38e44ee3138db09e
-
SHA1
1fca477369ffd062b71df6f1d5dafb2a106c820e
-
SHA256
e6349ffaa8b50d88fbad3ad09d8363533b30af9eec2fcfef81577daa9be850db
-
SHA512
0b54a3034b344e2fce15423d72f964f94fc86c1887076baf6fcd16e228583825bce888d4ce3327f6915a1f18c192fb556ebbfd03bf6c8cf1972040c78e6cad7f
-
SSDEEP
768:h////gpJcaUitGAlmrJpmxlzC+w99NBx+1oU7eD1OEzNqP6g9N5gMa+rEopSSI6G:SptJlmrJpmxlRw99NBx+aU7ezK6YafU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6faf33dcd2aebb8a38e44ee3138db09e_JaffaCakes118.doc windows office2003
ZQcjfdlPiQGGEW
jJPwzAXun