Behavioral task
behavioral1
Sample
9e8f9fd734eda14f8ca8a453ecb5c8a1_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e8f9fd734eda14f8ca8a453ecb5c8a1_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9e8f9fd734eda14f8ca8a453ecb5c8a1_JaffaCakes118
-
Size
83KB
-
MD5
9e8f9fd734eda14f8ca8a453ecb5c8a1
-
SHA1
bec34bf4a61d76b6a0ab4d3486ab39a20fbea4e5
-
SHA256
036491466b4cfef4088bef4870041708b49d7dfbd89624389c5055e4dffdba49
-
SHA512
308b29010e47bbb3fab60b04fb98dbb4e2bb3e2d00c254697a11d78e751efbee6b05ea66483d25afae01a0ca175de7af697f09529fdf44fd7e8589f7907ac92d
-
SSDEEP
768:zpJcaUitGAlmrJpmxlzC+w99NB++1ouRnuKLHSsm8eeOuGyUy/PjbfydIW0K+w:zptJlmrJpmxlRw99NB++aud0kHDvuW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9e8f9fd734eda14f8ca8a453ecb5c8a1_JaffaCakes118.doc windows office2003
lvCCIXbtbWa
KwGZnBwZBOBzin
rRccURw