Behavioral task
behavioral1
Sample
ef100fbe3ad8f50c04282a843f9cacbb_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef100fbe3ad8f50c04282a843f9cacbb_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ef100fbe3ad8f50c04282a843f9cacbb_JaffaCakes118
-
Size
91KB
-
MD5
ef100fbe3ad8f50c04282a843f9cacbb
-
SHA1
1408fa5acb5f4ce88f1e7199c0ac938245cd991f
-
SHA256
db4d83b0c0bb6db59e60f99150ac7539b1a38e5459720592ce896f88ce08b48b
-
SHA512
672f3ce8826fc56daaa975bccf27e1fbc65062a275a66b9205ded78d180c593b054a564aef16ab411a49789e834557b91fdeaa70573b6de2f6a795b350226e07
-
SSDEEP
768:6+1rXkDfrE/S+1oJwxS0JoXRdvoj7cLz67Xu8UrsmMFzA8vOsK12Gdx7v89HdY5S:6+VXu4/S+aJwaXFIrFLvvbG/7qR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ef100fbe3ad8f50c04282a843f9cacbb_JaffaCakes118.doc windows office2003
rwUQiDuKfGQlWi
zTtZoKRtMGcHX
huAqBWjXoR