Behavioral task
behavioral1
Sample
c7ca3d8c180a614f33030e2a5ac3cb0e_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7ca3d8c180a614f33030e2a5ac3cb0e_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c7ca3d8c180a614f33030e2a5ac3cb0e_JaffaCakes118
-
Size
66KB
-
MD5
c7ca3d8c180a614f33030e2a5ac3cb0e
-
SHA1
2e886856927ce32b13237e27549c7b795fa6f3e9
-
SHA256
28a30ca9deebf4e3ecfc1b3548356ecbea536217f6025d8f7e4482c4408f4449
-
SHA512
1078cb87b23943c62a1bde859136c651f4ae5fff7b66884e9dec5894e02c5e918d4cf7c903dfe0dba8c4d6b1753a7e044694f85cacea3376e49e50a59a73e5cb
-
SSDEEP
768:npJcaUitGAlmrJpmxlzC+w99NB38+1ove9A8B3w8jZlerhc2E:nptJlmrJpmxlRw99NB38+ave9A99
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c7ca3d8c180a614f33030e2a5ac3cb0e_JaffaCakes118.doc windows office2003
nEHLvviZt
jISkiNGlXB