Behavioral task
behavioral1
Sample
8b8f63fec8cd510d377d0a29f92a555e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b8f63fec8cd510d377d0a29f92a555e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
8b8f63fec8cd510d377d0a29f92a555e_JaffaCakes118
-
Size
63KB
-
MD5
8b8f63fec8cd510d377d0a29f92a555e
-
SHA1
4c03d0d1c177e2cbe79a5095bf8c4f5d30a06d0e
-
SHA256
898b646bf163d476f4e70bac6278b78228d44fef37d29ac87a8bdc3fcce9014e
-
SHA512
c6b1f1688d0bb255076a562329436018dcb41d3f472b06be3526ac5998215dd52ec1db01bd27b19d5aac77aca0a702565a19f2bbbc2f9dda98bbb29265058421
-
SSDEEP
768:6pJcaUitGAlmrJpmxlzC+w99NBF+1oy8Irrog2mFtO:6ptJlmrJpmxlRw99NBF+ay81gV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8b8f63fec8cd510d377d0a29f92a555e_JaffaCakes118.doc windows office2003
uJvbzmAijCNd
RXUVFhlzzAfO