Behavioral task
behavioral1
Sample
7af2b3ecbca62adc56f644b3dd4752eb_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7af2b3ecbca62adc56f644b3dd4752eb_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
7af2b3ecbca62adc56f644b3dd4752eb_JaffaCakes118
-
Size
115KB
-
MD5
7af2b3ecbca62adc56f644b3dd4752eb
-
SHA1
061ae7a71b04ed2a39fa45b72c9043aa05bab91c
-
SHA256
e7459efbafd2a237c51efd4f0404b9b5eecc948dde665a6d43181a8587710c33
-
SHA512
4df8d8ac1e9b8b766b6f26db39440c18cb733e19138d3cde99084a449004bd28f742ff26c89bd1b108fa59ddfaf039cfd232fd6b4565b7825a30b336a60a1b4e
-
SSDEEP
3072:6te2dw99fpGSMKqal52nuSTaa+hjbLjhuTus5SwgLOg32JqUq:iHdw7lMKqqMvTaa+hjbLjhuTusoNO1k
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7af2b3ecbca62adc56f644b3dd4752eb_JaffaCakes118.doc windows office2003
DKjcGJwViMraN
oKjNRrOpOYTW
NNCYbVKTso