Behavioral task
behavioral1
Sample
6c6730d6c653f77d68149fbcdd504dfe_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6c6730d6c653f77d68149fbcdd504dfe_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
6c6730d6c653f77d68149fbcdd504dfe_JaffaCakes118
-
Size
15KB
-
MD5
6c6730d6c653f77d68149fbcdd504dfe
-
SHA1
b17295e84793932cd3371ab05ff05a3239c22723
-
SHA256
b47f721dae6cc19389afdf8190fe3381cf382a3e3f8fe270603185d7396c4e72
-
SHA512
9155d9db24003deab92fd435f4d207e94999756fa955dbd9f564b34589e1ef920a164e085a8578ce995e92835fc9cf44a2985e6db6f98ef809c3ac77f71d6565
-
SSDEEP
192:TaYOhzUfEAtE8XE0jsA4xQE8eGCaQ+pfc0hzvmr5cdCjtq9lZWaZA:yhzUcAOkE0jSZb+pk0hzv6jtqfrA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6c6730d6c653f77d68149fbcdd504dfe_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros