Behavioral task
behavioral1
Sample
30ca59fd19f2ea733110d47eaa28df03_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30ca59fd19f2ea733110d47eaa28df03_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
30ca59fd19f2ea733110d47eaa28df03_JaffaCakes118
-
Size
102KB
-
MD5
30ca59fd19f2ea733110d47eaa28df03
-
SHA1
d805e91b13b5b78fe32c4f52df6d181b592456ae
-
SHA256
005010be1f9a0bd4cbaabce829c6fe1f13649dfcfd050458d171d6ee2714470a
-
SHA512
37cd95d34e90c7a5ec97ce90e47d50aab99195681be9c5ad483b360addd09b894dc5ca4cc5c9fcc5073ba3f7a3e6f9485ba3879ee5df0e71a6d22d0822b1ce8f
-
SSDEEP
1536:JrPEy2ZQbVcWzJ8Tapb2KlwfCI3GV2LE5zB8bwfwgGJ+pT:3i85bU7Yr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
30ca59fd19f2ea733110d47eaa28df03_JaffaCakes118.doc windows office2003