Behavioral task
behavioral1
Sample
79725173017cc145d65bdd9b7f624680_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79725173017cc145d65bdd9b7f624680_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
79725173017cc145d65bdd9b7f624680_JaffaCakes118
-
Size
117KB
-
MD5
79725173017cc145d65bdd9b7f624680
-
SHA1
2a7cf0d66c83bc43f9e8e8ae1e5dda4fbba4e553
-
SHA256
fd3abcce96da50a5c35852916049cf954dbc69a3e301bcc9e9dc3132de56d541
-
SHA512
45546baaeba55743428361ebcea304eb9cd79c0bb684612338cbce54c62d6d744dfd36b2f5fcf3b75c753cc55be4ad309a7528c493b78dff039dc7e1f3e81921
-
SSDEEP
1536:uvptJlmrJpmxlRw99NBp+a6zWra9u3PiYLZWhuJPAgBiDd+UwtS1AKfQvrc7h:gte2dw99fzrU2LZWaPAgB4MUIS1vY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
79725173017cc145d65bdd9b7f624680_JaffaCakes118.doc windows office2003
SfzDZjd
QzrkItJFOzw
ubnRELt