Behavioral task
behavioral1
Sample
be5c88caefb9537c61ecef59d4a07c3a_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be5c88caefb9537c61ecef59d4a07c3a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
be5c88caefb9537c61ecef59d4a07c3a_JaffaCakes118
-
Size
85KB
-
MD5
be5c88caefb9537c61ecef59d4a07c3a
-
SHA1
c047d4ed25130ccf295ac20579d346a509c15ead
-
SHA256
c9866dff4566c0772857a9a312425dca0f5eaab1f62d1f1d98b9184a116c9283
-
SHA512
01247366055705c4bd31585c43b7a3113b9321203604abea2e1bc6b3721985481932dd581f324bc4674961160bdd0558dd4830655a313d5e4a2d73897e1343f2
-
SSDEEP
1536:cptJlmrJpmxlRw99NBx3B37+aFg3v3S1pgHZFP9Ssuase1jS:8te2dw99fx3B3Fg3v3SIHPfl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
be5c88caefb9537c61ecef59d4a07c3a_JaffaCakes118.doc windows office2003
AIIfUddBvsC
mTDiVPJjjQLbi
aPPnsUziqWni