Behavioral task
behavioral1
Sample
0dbb4191e4ec65726cbc956ed357f203_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0dbb4191e4ec65726cbc956ed357f203_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0dbb4191e4ec65726cbc956ed357f203_JaffaCakes118
-
Size
117KB
-
MD5
0dbb4191e4ec65726cbc956ed357f203
-
SHA1
9d0673e9a68c432ac47750207501f05b959e6d52
-
SHA256
23b28b4a33e26f681af0ca868327583cf027e516c9d5adc78b1885d69e1cf00e
-
SHA512
375176f396287aba297d3a5fd76e880997911501a3a8288a2351fece925e1645fb577ec2e67238739598628fb8a0f31016a36c7f7528ddfa4ff385108e436277
-
SSDEEP
1536:MptJlmrJpmxlRw99NBq+aX/H9LfB9fiChFDn3fNDBSwfuYC+a:Mte2dw99fs6qFPNDBYP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0dbb4191e4ec65726cbc956ed357f203_JaffaCakes118.doc windows office2003
oIkdvbi
iRVUSIA
PhvGcsVjFjwRu