Behavioral task
behavioral1
Sample
5d287802c4aa94113e94ef0e7a0c8803_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d287802c4aa94113e94ef0e7a0c8803_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
5d287802c4aa94113e94ef0e7a0c8803_JaffaCakes118
-
Size
178KB
-
MD5
5d287802c4aa94113e94ef0e7a0c8803
-
SHA1
31a8f4160a82520e1f57899403186603a91a011c
-
SHA256
16380e6168e31a0098a70f629c0d5a1ade9f3230b322ec4a358fd85cf6bffd56
-
SHA512
86f7e767de546c19fd4fd50092b5c80819b9c38c3bc83d5bebf8942372709810998f1e5c1ad4cd0d917687c8d849d099834ffd718b231a41c693eb0c2d996108
-
SSDEEP
1536:G9otKt1KfMVQcklE0zlHHD93ydN94KESgOOVr6PAGI+vu6gTtA61vU9L9vS:rajx2Zl6PAGVu6gTtFC9v
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5d287802c4aa94113e94ef0e7a0c8803_JaffaCakes118.doc windows office2003
ThisDocument