Behavioral task
behavioral1
Sample
bdb5c3492eb7e7597cc4cb815c0c5ee8_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdb5c3492eb7e7597cc4cb815c0c5ee8_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
bdb5c3492eb7e7597cc4cb815c0c5ee8_JaffaCakes118
-
Size
168KB
-
MD5
bdb5c3492eb7e7597cc4cb815c0c5ee8
-
SHA1
5ef70438f749c223bc84ef4032002a94feda6657
-
SHA256
3ea403f3b70282f9ac439971a10c72a0d009eed18d1c3e88525115fb23e5097e
-
SHA512
faa99afa5e1cdfacab3aadc6ff60a9ac425f3d125be496cf3fb5c4f32754a751ac0b856f97e5ef07f810407834fd6c7bf1a3c376e11ef88c15f8e0d74c33618e
-
SSDEEP
1536:2DNVczHkD9icmT+FFdZ+a9SmggEHdpBsTLIYksPsoxars/zAfjgDuLVWyyrBdH8D:2Dn/iKFmpFWUf6Qrs/ztVH8KQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bdb5c3492eb7e7597cc4cb815c0c5ee8_JaffaCakes118.doc windows office2003
ThisDocument
SuQSbHhKKUJXm
BKKffzAFY
DhdwSpPHzno
jStMcLmpnu