Behavioral task
behavioral1
Sample
ce859fc050bd4feacc82a02d42a9983e_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ce859fc050bd4feacc82a02d42a9983e_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ce859fc050bd4feacc82a02d42a9983e_JaffaCakes118
-
Size
71KB
-
MD5
ce859fc050bd4feacc82a02d42a9983e
-
SHA1
9657ffc5a62d186e45e6f3a79c3b90c91886f2be
-
SHA256
11e12b3207c64301a9532612d442b6468f6c34d42cf7fc5de22c3313912047a7
-
SHA512
5bdc85feb301bfef6b325e715a7946e957ab54164bfe7db01fd935fd03f112e9748a0e683a7c600d35643c4a5b55cd5fcb47da1af1352366d3f3c7e0efc949ed
-
SSDEEP
768:tpJcaUitGAlmrJpmxlzC+w99NBP+1o5eaNdZupFCALxjWoU:tptJlmrJpmxlRw99NBP+a58sAFW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce859fc050bd4feacc82a02d42a9983e_JaffaCakes118.doc windows office2003
FqbciqGtwBwuc
nbwhzlh