Behavioral task
behavioral1
Sample
05f6112da66dd8e727d508996d68fcd4_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05f6112da66dd8e727d508996d68fcd4_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
05f6112da66dd8e727d508996d68fcd4_JaffaCakes118
-
Size
282KB
-
MD5
05f6112da66dd8e727d508996d68fcd4
-
SHA1
50f4ad3c58c3a9e7cfd5d9cdff4a9428faeb40b8
-
SHA256
5162b871a5689b77b28f9e6b9e6c47a34e79a52e4a6948edb75eb1ff5f594344
-
SHA512
c5176d9237aab56e37fa91da4a58e5173258c8e61ad87d06b8010396f0613294f2793e1f2c85095ad28594959f758492ac821f65cb462ca0220ad1bb0b0b9822
-
SSDEEP
6144:ZquUbJxaVpzHOoUf82JsLjBVydH800broyRn0iV39gKY:ZqDOVpCJsLjXWH80uroyRn0iVtgKY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
05f6112da66dd8e727d508996d68fcd4_JaffaCakes118.doc windows office2003
ThisDocument
wrap