Behavioral task
behavioral1
Sample
64c0443c20726159d0fd6c4cc91daab6_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64c0443c20726159d0fd6c4cc91daab6_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
64c0443c20726159d0fd6c4cc91daab6_JaffaCakes118
-
Size
44KB
-
MD5
64c0443c20726159d0fd6c4cc91daab6
-
SHA1
39c7a179b61896b7cd056eb206ce4a6aa18abb7b
-
SHA256
aec61fa097846f21b4be61f9fcf55e99b1f06fde331135b50da1fef2c7332d18
-
SHA512
18c6574621ffc5eb6167a54a1388595af3ab63b4be2521187e0939a9c8400e69aa477b477d29f35aa3304e6116e3bc2d4024cc87c059a6176c9a409789c94b64
-
SSDEEP
384:wVU8iSUR/8dAqqNLi08krJuHzQjbuMZZzkExygcPEdEsKhb2YOPygdP0jzNta:l/qtaLiEbbZZ19yhEd6yPJJk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
64c0443c20726159d0fd6c4cc91daab6_JaffaCakes118.doc windows office2003
ThisDocument