Behavioral task
behavioral1
Sample
6dcaa465f3d46a15f7f9e5c39587a564_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6dcaa465f3d46a15f7f9e5c39587a564_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
6dcaa465f3d46a15f7f9e5c39587a564_JaffaCakes118
-
Size
64KB
-
MD5
6dcaa465f3d46a15f7f9e5c39587a564
-
SHA1
2e0f1ee66fc6dc4408b9f086eeb0cc7bfd4edbf7
-
SHA256
0ee4fe4b987d783a2af34a5878ca72413ab03e3cb494fc38e393d83fc9ecb02a
-
SHA512
c9daba91bc0183576b5faca62126d9c387c2b689befeb389a3390c0f3452e5fb55b7df536331dde2b5833f150817908433e3bd01365607c7f467aa2cafe9d6c6
-
SSDEEP
768:cVNvb36jPtaVUa/jrFjZfxf3QN9DC4oHEjM539e5YZfKBUsp:cVNvbFUa/jrFjZfxe9DCVEjk3TsBUs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6dcaa465f3d46a15f7f9e5c39587a564_JaffaCakes118.doc .ps1 windows office2003 polyglot
ThisDocument
NewMacros