Behavioral task
behavioral1
Sample
752dbb7512d8035e11849fa0d7f488b3_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
752dbb7512d8035e11849fa0d7f488b3_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
752dbb7512d8035e11849fa0d7f488b3_JaffaCakes118
-
Size
122KB
-
MD5
752dbb7512d8035e11849fa0d7f488b3
-
SHA1
950618a6e5887cbff4741b4dd0e139579474788b
-
SHA256
bd492e2cd0f18bf045ae272d00e3043275c5df7745d3441c1680ceba44a9b68a
-
SHA512
e8ee383f7e850c6ea3913374634b1aa00635317d4a9628be70ec54a472a4e76d25c706e6c46501b7309e5f2c07398022d5f07b1c3555a60804de56d68c850129
-
SSDEEP
1536:RGJ9T76bf0wKUmywQmBVoqvykW7SAeDS3SySUwesvkpi5RtULbfJ:YT76bbMVRvS8LUwesMpi5mbfJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
752dbb7512d8035e11849fa0d7f488b3_JaffaCakes118.doc windows office2003
ThisDocument