Behavioral task
behavioral1
Sample
3bf8f6b49ca3c5ec940ce5e3c57a054d_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bf8f6b49ca3c5ec940ce5e3c57a054d_JaffaCakes118.doc
Resource
win10v2004-20241007-en
General
-
Target
3bf8f6b49ca3c5ec940ce5e3c57a054d_JaffaCakes118
-
Size
79KB
-
MD5
3bf8f6b49ca3c5ec940ce5e3c57a054d
-
SHA1
48b58cd0569df6afc603ced9170d16599fb35f50
-
SHA256
d9aeace1693c007d77d5b316adbeaa7c4a4df24870cc7dda4eed4ac267145b18
-
SHA512
4b181e405ff2b81f7e0584526db11c24d633b4d63ba808dd51490e2390eb0b0cebe373972531a018392092ba053f668f229de15cd13ce0316ba266baaa1d9d47
-
SSDEEP
768:WUzHVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBx+1oVA2SWQd32ef2RGGrTb:WQHocn1kp59gxBK85fBx+aVdU2eiGo
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3bf8f6b49ca3c5ec940ce5e3c57a054d_JaffaCakes118.doc windows office2003
vfiQkVjmjUMaE