Behavioral task
behavioral1
Sample
65a516955b0345b5e93bc29e27b2f386_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65a516955b0345b5e93bc29e27b2f386_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
65a516955b0345b5e93bc29e27b2f386_JaffaCakes118
-
Size
138KB
-
MD5
65a516955b0345b5e93bc29e27b2f386
-
SHA1
52717949c0beffd542f26611d403fba1f281a3de
-
SHA256
c72fd091e8a1d736c019d67277f221e67c198a4975cb38fa42e11ed8f363c677
-
SHA512
0c1424e2e346b40944bf512e38c027ffeacc43c494cafd0169174dc6feb20f2a920fd1ca3690828eab07b8fd0c5162e870ba30e1f34548542b3d2e2b36ecd7c8
-
SSDEEP
1536:Zu81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadp+aZys+Pz+kp:g8GhDS0o9zTGOZD6EbzCdXGaU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
65a516955b0345b5e93bc29e27b2f386_JaffaCakes118.doc windows office2003
vvHzpVdQmlPSj