Behavioral task
behavioral1
Sample
56cbbea8535c0e8ae967fcdec17db491_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56cbbea8535c0e8ae967fcdec17db491_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
56cbbea8535c0e8ae967fcdec17db491_JaffaCakes118
-
Size
6.4MB
-
MD5
56cbbea8535c0e8ae967fcdec17db491
-
SHA1
2829de0b258610b9e3279343661700ca16694a45
-
SHA256
70d44165f308acccfa77bfb60a7592fdd38c03e2a403745effec31e3fffdc3e4
-
SHA512
ed21ed9c5bb9db184a11167bf4452e63e434076d34522f36a2fc251805fae288aa3a25e515adef630636ab12bd865d110f9c60d08b09cc104aae65a84e9be7bd
-
SSDEEP
24576:nJBLCi8+IgnJMjDH9ZwiLC4JgGrM7vqNYeYwIstYXTLgQQ5MDcLQUrO/Z1WQ0mtD:JBLCph6rRDp72DwnH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
56cbbea8535c0e8ae967fcdec17db491_JaffaCakes118.doc windows office2003