Behavioral task
behavioral1
Sample
6b61324bf0aeb100d2c9da1c8310369d_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b61324bf0aeb100d2c9da1c8310369d_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
6b61324bf0aeb100d2c9da1c8310369d_JaffaCakes118
-
Size
12KB
-
MD5
6b61324bf0aeb100d2c9da1c8310369d
-
SHA1
f0476dd50af714ce4ad989fe2c0b380af03d670a
-
SHA256
2ffd88ecf6819622d1131a7459026306379023599bc27411ba645f79cb421b49
-
SHA512
b52bddf71c819b3cbac93111a1db133d31408d5a1bc183fdf1fd1ccebf3bb56cb0d3a5e420609b177b1562ecf138414c23d7d17278336ce74da88664ae739c5d
-
SSDEEP
192:8DzuswFJCGlmzA0jGLcZ7BjFAys+pyndSCgtgr/+Ra:8zu94G0zA0jGM7BBxs+p43gtm/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6b61324bf0aeb100d2c9da1c8310369d_JaffaCakes118.doc windows office2003
ThisDocument