Behavioral task
behavioral1
Sample
0e290a7eda4feda9557f65f80c0a750e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e290a7eda4feda9557f65f80c0a750e_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
0e290a7eda4feda9557f65f80c0a750e_JaffaCakes118
-
Size
464KB
-
MD5
0e290a7eda4feda9557f65f80c0a750e
-
SHA1
e612728748025b72784caee67cb997fc1742e346
-
SHA256
b87968f403dccd327d6a994500959776f21600bb3dd332ba80e4a51998bf6e6a
-
SHA512
c3b792d4df451b733840c903f0925fc65693f211678b47cb75b1e87b9377639198781388035fb70928d974e2101f2d08616fcd8ca8c5fba266fda229e954c542
-
SSDEEP
12288:W4Vmxj+4nxZOIjZOOI6aPAeYtH4i9jAPw6zKJJHKXl:WQqy4nxZHjO6aPAeYtH4i9jAPw6uJJHw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0e290a7eda4feda9557f65f80c0a750e_JaffaCakes118.doc windows office2003