Behavioral task
behavioral1
Sample
723f47c53018552ca0215c66092263da_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
723f47c53018552ca0215c66092263da_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
723f47c53018552ca0215c66092263da_JaffaCakes118
-
Size
241KB
-
MD5
723f47c53018552ca0215c66092263da
-
SHA1
9784d55d70eb987a104a26d1d24b3bbed79f6f96
-
SHA256
b3c6a641fd966a5ffa0a9fa9241ea45be5c873f2523ca0b281467968a3a78137
-
SHA512
6670b6629d5c5e4b88acc83f8ea16b696c389b0005c9de6d00406a46d874c1204665da0995fd30c01ddff4401c34298de93a7547ad88dc25e5d7d2b7eec91b58
-
SSDEEP
3072:tH9nBf4SuEjAhmAMOc7kkkko1rkGuF3tBInxGGq5EyXJm9YBmjDTy7D6tGff:tFVeEsjdXRC3jexGG6TYWofTyv6tGf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
723f47c53018552ca0215c66092263da_JaffaCakes118.doc windows office2003
bGQHJKU
msbilcAZjT
kMGQLqGH