Behavioral task
behavioral1
Sample
7c77d14f1fd573fa7949a97e75c2be40_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c77d14f1fd573fa7949a97e75c2be40_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
7c77d14f1fd573fa7949a97e75c2be40_JaffaCakes118
-
Size
93KB
-
MD5
7c77d14f1fd573fa7949a97e75c2be40
-
SHA1
bbe26297ee22aee64d4422016a2f54dee57ee62b
-
SHA256
91a24aab2ad3082af51cba1f3a17c74a5da5b1aba95be22db712c731e5a54d61
-
SHA512
827bfcfcf14416b1e9baabb0fc938ceafbdf429d66542a75886c6d1498c654775f85892950ffabc519e8ff26b1ea0eb052a512a59f01220394a8378ce0b415af
-
SSDEEP
768:hpJcaUitGAlmrJpmxlzC+w99NB55D+1od2rUPJEogB+/sDy1IDJynMviAgpLApk:hptJlmrJpmxlRw99NBj+aD6WWyndA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7c77d14f1fd573fa7949a97e75c2be40_JaffaCakes118.doc windows office2003
TmlhWiDUrYf
adKHRXzJGpZc