Behavioral task
behavioral1
Sample
65a045b3e7cb246a0d73e75468b8273d_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65a045b3e7cb246a0d73e75468b8273d_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
65a045b3e7cb246a0d73e75468b8273d_JaffaCakes118
-
Size
87KB
-
MD5
65a045b3e7cb246a0d73e75468b8273d
-
SHA1
0f96771da3efd722bd337ca57f3514ba30e0f351
-
SHA256
e80762c5909a3c7f409c3f0273ed96154fc887463b6748a0a42cad16fadbf6e5
-
SHA512
42a202314570aa5963a7de0b0a386488ea48f3193015a2005f290419ee30aa574eaefc5beba38a34f99cb97e1c6c098c701a07b782879736b6daaf36e912473a
-
SSDEEP
1536:Yl0suyCPocn1kp59gxBK85fB7s+aM14E0/SO8Mkk:uu241k/W48cp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
65a045b3e7cb246a0d73e75468b8273d_JaffaCakes118.doc windows office2003
vGnocljVO