Behavioral task
behavioral1
Sample
6adc070ab84c3f5a4dd225c851cd49c5_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6adc070ab84c3f5a4dd225c851cd49c5_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
6adc070ab84c3f5a4dd225c851cd49c5_JaffaCakes118
-
Size
74KB
-
MD5
6adc070ab84c3f5a4dd225c851cd49c5
-
SHA1
c6320148b078e764204e87fc85cdb54ef4b8491a
-
SHA256
50128add4f9eb89878473727c1e18acca17e7bf243b8437455dec4995dc44141
-
SHA512
d4e2af5cabfba3d6b6ca3a064e58f4aad751a40d49225e1594fbaae29cb5da994e9af8abbab926cb65ad5592e149e0edb2ef8609dc56e6b743b325b8c6112dd6
-
SSDEEP
768:6pJcaUitGAlmrJpmxlzC+w99NBR+1odD594eohl3pq5MIUsk6y:6ptJlmrJpmxlRw99NBR+ad1sPqIT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6adc070ab84c3f5a4dd225c851cd49c5_JaffaCakes118.doc windows office2003
oYiVGZzE
dljiuZmRkHhnSk