Behavioral task
behavioral1
Sample
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118
-
Size
14KB
-
MD5
60817a784d7b3576a4f3838daa8577a6
-
SHA1
1079de44fd11812efae7cfd5fae6bc3b29f4bdd8
-
SHA256
6290556440aaf01ba9a11bd6fdf6ac0e7e548829652f517abf3b921650510d9e
-
SHA512
1441557d72a12762ec198c357d203a3d48230ce7b1b1491bcf19e41a7b6d3bef7c08c65be2adbcc3b5ed064b09947748e67c99d00661a98fbf49cc1d7030cc74
-
SSDEEP
192:h2VFt4AqFv8Z6pMzquslF+pcBQ/YskWykIyogPy0jKCNaW:hatsN+ns+p4EktkIyogPy0jJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros