Behavioral task
behavioral1
Sample
b6b016cce92cd08f824642795e05f678_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b6b016cce92cd08f824642795e05f678_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
b6b016cce92cd08f824642795e05f678_JaffaCakes118
-
Size
252KB
-
MD5
b6b016cce92cd08f824642795e05f678
-
SHA1
dc7ac9ce42f9c112fc80937762f6703310733e51
-
SHA256
8675fa8bb4dd9e5024a5bef338e424b4286b66e0103f5a036df241c295a5639e
-
SHA512
bdefd57fd1910ba086f57ba99cac703ee0feac05369a732f6e7a6253dbb9b1587a6efd19f301a020f7021d9b57a2e40c2fdbd3c028673925bed6889008500710
-
SSDEEP
3072:tH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5YyXJm9YBmjDycWc+D+2lR:tFVeEsjdXRC3jexGG6PYWofbKhlR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b6b016cce92cd08f824642795e05f678_JaffaCakes118.doc windows office2003
RoRObvBKJjqLPh
iRGtCRGrY
zbQmIwipLm