Behavioral task
behavioral1
Sample
5bc521b758d2288503d5c59d06d62dfc_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bc521b758d2288503d5c59d06d62dfc_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5bc521b758d2288503d5c59d06d62dfc_JaffaCakes118
-
Size
77KB
-
MD5
5bc521b758d2288503d5c59d06d62dfc
-
SHA1
57c7d979ef03f90583e789b6eab17394e07a9b0c
-
SHA256
733668adb75a557390e1170023a577b9176c3fb4885adce8e663a3062e1f22b6
-
SHA512
eb93739878b97dc28252a72de7e7a116b36e5fa150974c5c3c9d38bbef86228e82e43ac1b82caa27275dc761ea527847a98ed2bd82725cc5edce04db5d4b9519
-
SSDEEP
768:/pJcaUitGAlmrJpmxlzC+w99NBd+1oY/SYXCP9xSoDzXC0NWOnnqr/qrgJcoQjt:/ptJlmrJpmxlRw99NBd+aYqJzjeY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5bc521b758d2288503d5c59d06d62dfc_JaffaCakes118.doc windows office2003
cbIPRfAVPurh
SddtwIVmnX