Behavioral task
behavioral1
Sample
fdea0fb77ebe8c7e18586e0dc397d780_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdea0fb77ebe8c7e18586e0dc397d780_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
fdea0fb77ebe8c7e18586e0dc397d780_JaffaCakes118
-
Size
72KB
-
MD5
fdea0fb77ebe8c7e18586e0dc397d780
-
SHA1
d863efe5436cb7e8cb648b8d856d865fefa7169b
-
SHA256
81b046c5fc8974e4e67ec360bc7a4b8f9a1adf3e70b21838854a18bc55d5f428
-
SHA512
8cbe112acf5c0cd0b26a038e6cd25955a60827deb6c029b11979ca2be01ca41d6a4fe6b5a469656b93d2a803c3e71bb178e49676feee18e3d63bb0fd3dd2d963
-
SSDEEP
768:f//ZrkuhCiI+35XYe2FOy/qI+o7Zk4ta27+sNMQuHi/RYTfqFjcixmS:f/x4uhrIHe2FOgqIb7ZX3r/R4FixmS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fdea0fb77ebe8c7e18586e0dc397d780_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument
hSMqMmUHxK
EEFwbzJc
ZVECJdWqd
mrwMbne
dOpDT