Behavioral task
behavioral1
Sample
9be18ae2aff7a423a22ccfc931c63872_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9be18ae2aff7a423a22ccfc931c63872_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9be18ae2aff7a423a22ccfc931c63872_JaffaCakes118
-
Size
80KB
-
MD5
9be18ae2aff7a423a22ccfc931c63872
-
SHA1
727222546983ce72e639fb01b114cddd0f3f083d
-
SHA256
a09146bfbbe1fde7b5880aaaa66fd93bfcccf9c92fdc5a911e7f564f86990ed6
-
SHA512
54bcee79d3bf02a2a62a0617d9e3584f3ef86ae5403dc95e3b9d9b9bd0b59abfeac0745fd3a04fc948a3b6415ac75fa36a0f71c5137ae1db15d3b93c2d7892f1
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBy+1pn/6pX+nTAlLouQwe5+n4vTvy3/:1ptJlmrJpmxlRw99NBy+PkX+nOK44A
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9be18ae2aff7a423a22ccfc931c63872_JaffaCakes118.doc windows office2003
bWRoMqWUVLYQ
zNKbdFFfYvGTw
kTzTETTaQQDikV