Behavioral task
behavioral1
Sample
83ccf6432e363683498177af28063a50_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
83ccf6432e363683498177af28063a50_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
83ccf6432e363683498177af28063a50_JaffaCakes118
-
Size
143KB
-
MD5
83ccf6432e363683498177af28063a50
-
SHA1
31d72f10c835941e1debfc70b27e226a52f0862e
-
SHA256
cc12a4515dc7e1a22b15b9095dd7e37b1e862c88ac2587a7aabe3555b54e6ed4
-
SHA512
78691848421eade5120c10c5350403632d17bdc228009fc17341c746c3dc89389f9c3302c85635992f934196147d05e80d792ec1d35d2e6ad42b0bff99b612f7
-
SSDEEP
1536:jcwd6e1MI78wyUVxBh5j/2lwkZolnMDs3nRd1BYRO69owtFmXsQT7/5mD+a76TOz:IO6eqU1CSIoD0ROL+Nsz5maa9kLHQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
83ccf6432e363683498177af28063a50_JaffaCakes118.doc windows office2003
ThisDocument