Behavioral task
behavioral1
Sample
7d79589db0faf8c533304af5e5e8e4d5_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d79589db0faf8c533304af5e5e8e4d5_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
7d79589db0faf8c533304af5e5e8e4d5_JaffaCakes118
-
Size
72KB
-
MD5
7d79589db0faf8c533304af5e5e8e4d5
-
SHA1
58032cd086f7d47ec87f12eb640e54af380f144b
-
SHA256
8ff5abab68e6092cc1c226801acfbdaa48e4d1ad77b585e14df9f4d78d074aa4
-
SHA512
5755793eae1f79661261a0abdce969482c3ce0b98b198067571cd6b002022340e4c20beba8fa4ab95b338e57733d926b6d146ea5fc95bd046ea1bc4f766eb553
-
SSDEEP
768:XpJcaUitGAlmrJpmxlzC+w99NBxP+1o7BESBbXET6i6YtjsW:XptJlmrJpmxlRw99NBR+a7W6iD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7d79589db0faf8c533304af5e5e8e4d5_JaffaCakes118.doc windows office2003
LhPBpKcukiC
ZUwMziAcjq