Behavioral task
behavioral1
Sample
856dcdca2a609882acbfb05229769a1b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
856dcdca2a609882acbfb05229769a1b_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
856dcdca2a609882acbfb05229769a1b_JaffaCakes118
-
Size
72KB
-
MD5
856dcdca2a609882acbfb05229769a1b
-
SHA1
12ea4b0cec8fdcec5bfe35c74d3c68bc85da9c02
-
SHA256
9bbc58f3ffe3c94d85bcfbf5829d997062a9c9d9198f72baf868335244f0f5ac
-
SHA512
28e3dbdd517aca6bee23f8fae67117c726654a2d6b0796bdd8c835fb660a3f735f7ba86c51855b0f49a1603a7931a1f0829f0f067aec5eb773710283fd19aef2
-
SSDEEP
768:2szwJmm9S/QHBjcQjiVJMEtJVIg9dO4U5n+85Ood8j/qErAwO8drJl7sZn:2ss9qkBjc+4JVIAdGA8jd8DqgA2rf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
856dcdca2a609882acbfb05229769a1b_JaffaCakes118.doc windows office2003
ThisDocument