Behavioral task
behavioral1
Sample
730589f4fa17619ba4a0b4760aed0426_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
730589f4fa17619ba4a0b4760aed0426_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
730589f4fa17619ba4a0b4760aed0426_JaffaCakes118
-
Size
137KB
-
MD5
730589f4fa17619ba4a0b4760aed0426
-
SHA1
9d73fa94716aa74b82061ad310f525e9f51496df
-
SHA256
ba60bdcdedfdecf24747f96a44ba2df973496807bf6b1080d9800feb53755242
-
SHA512
8ca2518244d1ba6f8a558af3f8e6948e9704ea283cef15ea9b2fc9396a36765088df2ab249cb667761026290a88b03ae72cf1fd46c295f6dfda5166d54493799
-
SSDEEP
1536:b5T1coc0qg43CzKj+aJwQiKn8m2q7m4MHxD7VNJVZX2xX7OnmecrwSgehfu7Qa19:dmPg4p6xufllLZowvOe9j+B
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
730589f4fa17619ba4a0b4760aed0426_JaffaCakes118.doc windows office2003
KkYRTjKtTWl
UJNLNMoFTJi
UVPSZZZ