Behavioral task
behavioral1
Sample
72e69b0bbd5fb4d0d83a7fe4fe8f1234_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72e69b0bbd5fb4d0d83a7fe4fe8f1234_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
72e69b0bbd5fb4d0d83a7fe4fe8f1234_JaffaCakes118
-
Size
195KB
-
MD5
72e69b0bbd5fb4d0d83a7fe4fe8f1234
-
SHA1
2ee022c7b7e85dce006c19a963fcdbae2b0c85da
-
SHA256
5b9bce29afccc2b7c343b74f571061dd8c148a162849b1263913f549a5f14ce0
-
SHA512
5634d571ecf9c1f67d05c4d3ec934b5970292fcc34765c99fe6d91f4270e09d9ae9becd9f4d661f19bcaa24c97cb1122eae852a483c2746c674732dd11d545c6
-
SSDEEP
3072:cgn/iKFBaqCHonM8VIGNsmBGorUKqkr+1NPnjnw8WKzR:cg/iQBacxNsmBGo4dkruBnjw8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
72e69b0bbd5fb4d0d83a7fe4fe8f1234_JaffaCakes118.doc windows office2003
oZBrZRoMX
pqaivbiBnMB
GXWjKTfTwpuHwE
FjZzonWC
vTViSkuT