Behavioral task
behavioral1
Sample
72876c0263ddefdf0368d6b84979068b_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72876c0263ddefdf0368d6b84979068b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
72876c0263ddefdf0368d6b84979068b_JaffaCakes118
-
Size
15KB
-
MD5
72876c0263ddefdf0368d6b84979068b
-
SHA1
f88b743d5cdb566facde54202848b889b515b7f2
-
SHA256
3818e26d6e06f7dbf5947d2057a7f04fedf8fc20b03b3cb2730f694a6d1c9e6d
-
SHA512
ae78af74c2ed9cbe02452f0ab4fa6f081b201f5fe44302622853f2af43d445ccfd73de7757e80df2110eb8114c8ca1c6dfda0133d2442af6f269638d9463acb2
-
SSDEEP
192:xIDKOk7iZx+s8XA0jxbl8Os8H/8Es+pftIpz/21puMcl6wwOiaEtQE/Cmtka:CWpGjTcA0jL4G8Es+p1IpzQzceSEth/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
72876c0263ddefdf0368d6b84979068b_JaffaCakes118.doc windows office2003