Behavioral task
behavioral1
Sample
ee9da2b43f42748015ec1c0bda2fa6aa_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee9da2b43f42748015ec1c0bda2fa6aa_JaffaCakes118.doc
Resource
win10v2004-20240910-en
General
-
Target
ee9da2b43f42748015ec1c0bda2fa6aa_JaffaCakes118
-
Size
44KB
-
MD5
ee9da2b43f42748015ec1c0bda2fa6aa
-
SHA1
286ce8290e686b338020b7952df9bda9db87f291
-
SHA256
759b48cb59e0c8bef80a7f181027dedce6579aababfd19dd6fb78dfc1fd10aa6
-
SHA512
ff60977e8ccc3e4203f144279cef1c3ccbeeb5ef15f68788a307a9e02a6708a1da984b8a1a8bfa2490ae94c32c1f980468f0f1a4db9daba7c95bda7d4042c2b2
-
SSDEEP
384:wKn8iSUR/8dA4qNLi08krWuHzQjbuMZZzkExygcPEdEsKhb2YOPygdP0jZPtI:1/qvaLiEMbZZ19yhEd6yPJJa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ee9da2b43f42748015ec1c0bda2fa6aa_JaffaCakes118.doc windows office2003
ThisDocument