Behavioral task
behavioral1
Sample
30fcba5dca7bf27aa5a37d2f070eecb4_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
30fcba5dca7bf27aa5a37d2f070eecb4_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
30fcba5dca7bf27aa5a37d2f070eecb4_JaffaCakes118
-
Size
205KB
-
MD5
30fcba5dca7bf27aa5a37d2f070eecb4
-
SHA1
72d82806589aeb7f81bc0ee5569df13ab33a4c8c
-
SHA256
3a91abc1a263c89ea506c267618dab2bd90fbf20fa84b27ae224d6f3386a2545
-
SHA512
bac4ada54f1182f93aeef65fe350b5028b66d6c03a4486240708b035b39490d4ae361ec5229976170b5eee2873d6db09870b48b70440d56e138f70ffb4122c4c
-
SSDEEP
3072:D0U3pB1GND30+0WNmqVDx23EUPrvBW8aBjvfn/2LJp:YkVGND90WUqpxYEUXaBDfnOP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
30fcba5dca7bf27aa5a37d2f070eecb4_JaffaCakes118.doc windows office2003