Behavioral task
behavioral1
Sample
77fa28e31ec25d1d8d1e639018d9b52f_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
77fa28e31ec25d1d8d1e639018d9b52f_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
77fa28e31ec25d1d8d1e639018d9b52f_JaffaCakes118
-
Size
78KB
-
MD5
77fa28e31ec25d1d8d1e639018d9b52f
-
SHA1
a7d364424df2b19000b76dadd0856fe107ed9f80
-
SHA256
8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a
-
SHA512
445574d75edc96c67fe10b4c0ee12c6867015793d7b1672577ace4ada0717715d5aa66fe4fe14e7c32a5c355baf065e4e62a829cf6ed767b0454f8c02f434f74
-
SSDEEP
768:NpJcaUitGAlmrJpmxlzC+w99NBs+1o0TLn981ZmtRkd2kI1IZdPcZI6QF9mMg/:NptJlmrJpmxlRw99NBs+a0V/+sIZdTT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
77fa28e31ec25d1d8d1e639018d9b52f_JaffaCakes118.doc windows office2003
wkmwdMaorjp
GvvbJIJYNc