Behavioral task
behavioral1
Sample
5c35910b67ab050d07bf32199541ee31_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c35910b67ab050d07bf32199541ee31_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
5c35910b67ab050d07bf32199541ee31_JaffaCakes118
-
Size
69KB
-
MD5
5c35910b67ab050d07bf32199541ee31
-
SHA1
066f5b7a8b19a154479963f3b4cc966c953cd07f
-
SHA256
66f8fcc2dc5ad76b8818676f97037f3c0decf466abb0a97d14c468160adc52b1
-
SHA512
0d59aae0f06946794b5766607a98ced548337020be7bea1461fc8f95b0d22946ae5145055423aa476233c2c20cb7a75710add9ac0e4a71fce69f0ccb79375cb2
-
SSDEEP
1536:zptJlmrJpmxlRw99NBF+a/szUmUmUlo/gGbc2+:9te2dw99fauNQc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5c35910b67ab050d07bf32199541ee31_JaffaCakes118.doc windows office2003
iwfCjJUwfjJCf
szvwrqz