Behavioral task
behavioral1
Sample
102fab083b4812c617459c27ef5302e8_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
102fab083b4812c617459c27ef5302e8_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
102fab083b4812c617459c27ef5302e8_JaffaCakes118
-
Size
74KB
-
MD5
102fab083b4812c617459c27ef5302e8
-
SHA1
1db8aebb38bb0b6ec8c3b22a9da52617b99eba0a
-
SHA256
764122c8c7d3c80f2c4c5c812333b6d804683a90cd5c6ffe28d36e6bbd2ac90e
-
SHA512
238d826f4cdb52ae8c7cec77d21c265086f5a67e45e04f39e841dfed0da0593eafb29a0c63e133b2e19a1b88ac42dd09b3f93f200d165a7b2e65a0b0b5c72e07
-
SSDEEP
768:spJcaUitGAlmrJpmxlzC+w99NBh+1oXvgTVAcV0vOsPnmP:sptJlmrJpmxlRw99NBh+aXOAhPn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
102fab083b4812c617459c27ef5302e8_JaffaCakes118.doc windows office2003
jisMDRw
IDrCGYOVw