Behavioral task
behavioral1
Sample
6390ace810631b6f1e2af1453811ee01_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6390ace810631b6f1e2af1453811ee01_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
6390ace810631b6f1e2af1453811ee01_JaffaCakes118
-
Size
77KB
-
MD5
6390ace810631b6f1e2af1453811ee01
-
SHA1
73c195d807ac0295d261ca1e28bbf3651e7f9b54
-
SHA256
ee339ff1295cc89c436d68bc87a3493120d83ee407932ef5b3322d963f1c236f
-
SHA512
eb4d70fac30a168790c4d738f349935fdbe2b030b22d1f5e6f945ebd7b7b12f4f6bd8b096f68291b4982ebd6c84d2b953094d6d126b32c7964ab7cbd9ac9aa89
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5VuB2DZrVeoBE:Qte2dw99fRuBYZrom
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
6390ace810631b6f1e2af1453811ee01_JaffaCakes118.doc windows office2003
dGmbmtWbCXbuEh
WnQTVBapd
AIdTOmiMwSr