Behavioral task
behavioral1
Sample
bdd8c2603ca097ff507a1ace926c923d_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdd8c2603ca097ff507a1ace926c923d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
bdd8c2603ca097ff507a1ace926c923d_JaffaCakes118
-
Size
106KB
-
MD5
bdd8c2603ca097ff507a1ace926c923d
-
SHA1
8b4f40f850f9072c1d099a094d8b4695b3d85072
-
SHA256
383f153a21492c3945e5bd4cc39e5b6cc94ba51718431283756f24dc8e0b22f8
-
SHA512
c462f80c22fae3dd060c00ff83d73698b9d43236ea997b189eb93cf9f84223ff9eaa5ebb9bc4b16b90219a11dfa03f1f5b27814ecd35c147c9b6ff42606201c7
-
SSDEEP
1536:YptJlmrJpmxlRw99NBh+aqCSqvHAzcOV7v27bS9q6mgW+tMf:Ate2dw99fYqvHAzcOVL27wmgds
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bdd8c2603ca097ff507a1ace926c923d_JaffaCakes118.doc windows office2003
qjCmQBTjrof
jpSXWwoTWHY
GOrdZzmiAw