Behavioral task
behavioral1
Sample
ddc967f0053b83ac5c0bbb8a19634f3a_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddc967f0053b83ac5c0bbb8a19634f3a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ddc967f0053b83ac5c0bbb8a19634f3a_JaffaCakes118
-
Size
266KB
-
MD5
ddc967f0053b83ac5c0bbb8a19634f3a
-
SHA1
8a096341793625a7496fee507915e914da956ebb
-
SHA256
c9d839e7d59cdc4adefa73a88d0027267c9d1ca5b41e156cc64e5115be7cf8c7
-
SHA512
766c9efd6471c8ea05e56c0dace685323c10e1344b7a7dd26efcbb93f066df38e1a533ff9b88bfc8cf33385f6253c4d2c8f3233cfd32536f9d2727668204de82
-
SSDEEP
3072:SkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPw45xUB5BECCc:SCwQK3RpVS7G4SVuz1QzLhxztsZGPwT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ddc967f0053b83ac5c0bbb8a19634f3a_JaffaCakes118.doc windows office2003
ThisDocument
OAwga
bsY9RhaJO
mXBLJCKz
f