Behavioral task
behavioral1
Sample
5c815986d0c990404d8f789874422628_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c815986d0c990404d8f789874422628_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5c815986d0c990404d8f789874422628_JaffaCakes118
-
Size
125KB
-
MD5
5c815986d0c990404d8f789874422628
-
SHA1
cb177bfdb42616e03b74c0eda5f655bcd2791ad1
-
SHA256
135fb95c2a6f0d3c198283f35289317a5586ff3755d4a7838cde1e66ddfc118f
-
SHA512
f865a579b3583c0748952b42bb2099ec3f0e4e7989d1fcf45e1b02438cf3eb340806663103ed6098e5ec9928b1a38774018a03a8d768d6d83efc80bdcc72f326
-
SSDEEP
1536:7ptJlmrJpmxlRw99NBD+aE0V2ABDrtGcONzhSTSriGcNdrBgZI916TJaQ91:Vte2dw99fl96AxGcdgE16r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5c815986d0c990404d8f789874422628_JaffaCakes118.doc windows office2003
BIGvBwSwFq
GFzhMzYDth
EnPIwkwa