Behavioral task
behavioral1
Sample
30b35d76a6de05b206a4a5d553255e2d_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
30b35d76a6de05b206a4a5d553255e2d_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
30b35d76a6de05b206a4a5d553255e2d_JaffaCakes118
-
Size
37KB
-
MD5
30b35d76a6de05b206a4a5d553255e2d
-
SHA1
b1894071530764c5dc35d2bb8a23313a076cdbec
-
SHA256
ba933081ff6d3cc17e8e18d702e05b62e902c83cd9109a68fc47e93d4a37decc
-
SHA512
4159b567f244d641a226df7199645e6d6f7734562077f640de3df0f46bc3e7ea4d5eb47ef71644f0ce4a7828d402221df7c40e11c356aa3eb3fa56559c06640d
-
SSDEEP
384:c58piS8px8SMDeIIzUv1grWSYFLN0jcnknfhJ3XQtj7Z0F62:cKu3y+z6WSpFhmhJa0F62
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
30b35d76a6de05b206a4a5d553255e2d_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros