Behavioral task
behavioral1
Sample
9b9ae00de8bc44c299bd0ddbf0d776ba_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9b9ae00de8bc44c299bd0ddbf0d776ba_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9b9ae00de8bc44c299bd0ddbf0d776ba_JaffaCakes118
-
Size
125KB
-
MD5
9b9ae00de8bc44c299bd0ddbf0d776ba
-
SHA1
8464d2b911e5955d053f5e9a9ba47fc3c5ac3ee6
-
SHA256
c44f7be26a285f5eb43c8eb863a017b22355f44b3e919d9b6a27ca895e96a3a2
-
SHA512
bc74aad5cc2fbc896aa513adce5ed511fa9c90c3c8c043ffd496b482ad763e8e5c1e6627b716c7e75d396ef2ec34c3413318675eaa6bcbdb1cafba1cd23b3f3f
-
SSDEEP
1536:7ptJlmrJpmxlRw99NBD+aEaV2ABDrtGcONzhSTSriGcNdrBgZI916TJaQ91:Vte2dw99fH96AxGcdgE16r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9b9ae00de8bc44c299bd0ddbf0d776ba_JaffaCakes118.doc windows office2003
BIGvBwSwFq
GFzhMzYDth
EnPIwkwa