Behavioral task
behavioral1
Sample
72ead2268e7c5074cd99d4b5d8493533_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72ead2268e7c5074cd99d4b5d8493533_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
72ead2268e7c5074cd99d4b5d8493533_JaffaCakes118
-
Size
37KB
-
MD5
72ead2268e7c5074cd99d4b5d8493533
-
SHA1
71688a6583dd23e439bb8ed89518755f2ca58c71
-
SHA256
029ee6c4c3036edd5d7237129de50bcf7e13c42ac72a86ba888d4e61265033bc
-
SHA512
3f6ba3126b992b5cf3714e35aba641c5df002c665fad8106ce9b58cf42810b8eb9b1c3bad64bab1df6ff6c79bcc8d8a2b6c19b590bb92f3157d16adbb2a5d54e
-
SSDEEP
384:x1OeRkUf7MuCeDaL/fN9eDaL/HJuhyZTg1q06i9D8ca/0ywtJjarRrX1rDFlOtVY:x1OeSUf7MuIbjbpuhyZUYAs0gRD1ru8X
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
72ead2268e7c5074cd99d4b5d8493533_JaffaCakes118.doc windows office2003
ThisDocument