Behavioral task
behavioral1
Sample
75a2ca805629ab382888a92ebafa6132_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
75a2ca805629ab382888a92ebafa6132_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
75a2ca805629ab382888a92ebafa6132_JaffaCakes118
-
Size
126KB
-
MD5
75a2ca805629ab382888a92ebafa6132
-
SHA1
99fae484f130848323495e93a1a66bbaa41c8465
-
SHA256
78d1974233c9b769b6fe2b06680cd0c24b53589a1a5947100e5507624a996cd2
-
SHA512
8280f720cb680687f0a8e0c72eacda5bbffec19ec30029886893a930a2f82f507cc428f13120ebc0ca9c02b270a23cab21b097cbe89a7211301f63a4c12692b2
-
SSDEEP
1536:sXqfuyTWIcEzqVK1zha5SYQoibTaMCh5GyCiQuytfVw7e343RzV/jHR:s6WQza0zhciX1Ch5GdiwfVwvBh/bR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
75a2ca805629ab382888a92ebafa6132_JaffaCakes118.doc windows office2003
ThisDocument
AwhuaNEjIfhpQd
iRjIarSuwwZlYb
wzDGpvjHvsTu