Behavioral task
behavioral1
Sample
d62dbf8e3ecdc50e02628b119872c67d_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d62dbf8e3ecdc50e02628b119872c67d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d62dbf8e3ecdc50e02628b119872c67d_JaffaCakes118
-
Size
160KB
-
MD5
d62dbf8e3ecdc50e02628b119872c67d
-
SHA1
eb190ee517b585442be061dc345ddb2c48d16d23
-
SHA256
bad62e4e202d5359edfbf7e72f9fa038db6472e9664090fe1c9685dbf48041e2
-
SHA512
5a943fb98d232b5a8ec8fa6b968869a7f6489a8077ae14e004bd07ae622d4c8cacdc75f395abea2fd81fe5f4833849ec0c051ee6635743a0e66c71bf665a2fd6
-
SSDEEP
1536:dcNVczHkD9icmT+FFdZ+a9mGTd+/h1ZmnPa5feyl+u34Y4Uz3ua4dtgQ6MBGIzeF:dcn/iKF0GgXZD5WZg14dtLGIFhxI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d62dbf8e3ecdc50e02628b119872c67d_JaffaCakes118.doc windows office2003
vTnACJGnudBl
MzmOzAPcBMKMKU
BsmzhVsiHZh
tUCbAbzahuc
KMSTMDwTAU