Behavioral task
behavioral1
Sample
df7f77dd3d5fcb10299cc518c2727c00_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df7f77dd3d5fcb10299cc518c2727c00_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
df7f77dd3d5fcb10299cc518c2727c00_JaffaCakes118
-
Size
114KB
-
MD5
df7f77dd3d5fcb10299cc518c2727c00
-
SHA1
5fb6ae8ccb34cb2f2c1f9d772b814470140c59e0
-
SHA256
bdc8907c19b321df8a53d24339287ecda858fb09c10c4f6fd04d818a72553e34
-
SHA512
bd6f75db7f9a4d16aa36cc9c8b859a24cc51f96fd0bfa03f577830cb5ee7b60c071145cc24631956598e9e69086585f9d305ac1608e32bd446e5e7d3983d2df6
-
SSDEEP
1536:XptJlmrJpmxlRw99NBe+ariivvvgJYR7NH1OC+QG8t7glnCY6r0dTFcut:5te2dw99f1Cx9+QFOlnXdZnt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
df7f77dd3d5fcb10299cc518c2727c00_JaffaCakes118.doc windows office2003
idowImtn
pdUUhXOIKdYDW
nnYvBzJriWn