Behavioral task
behavioral1
Sample
64cdbad4a15639450cd2d8e3da86d87c_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64cdbad4a15639450cd2d8e3da86d87c_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
64cdbad4a15639450cd2d8e3da86d87c_JaffaCakes118
-
Size
183KB
-
MD5
64cdbad4a15639450cd2d8e3da86d87c
-
SHA1
8784dcb749f3283f3c8ca9c7cf109603ed77f556
-
SHA256
ab09308a710d38ef44f43c1e86fb9ba8fc8c7ba7ce05fb15441ca8f91fa0906d
-
SHA512
3ad51b1953df9f002f1f660000a52d3a136164ba8f81bd18e0df47b15ca0c1148ac656a519ab22d4153a1f9c31101a4a570c70f55323e90236ed946532b59786
-
SSDEEP
3072:s6SyBEJLyrT9l/BimRXCLyrnC+DUsXGduf7JLyrNRXCLyrsKY2+oayyfYoogt:NEJ2bBDZC25DUsXGg7J2pZC2oV2BDyQy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
64cdbad4a15639450cd2d8e3da86d87c_JaffaCakes118.doc windows office2003