Behavioral task
behavioral1
Sample
87cf239da2f6be707863119899a51869_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87cf239da2f6be707863119899a51869_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
87cf239da2f6be707863119899a51869_JaffaCakes118
-
Size
88KB
-
MD5
87cf239da2f6be707863119899a51869
-
SHA1
82ff49eea53759f63a03b90a73a152fd8c207bde
-
SHA256
63e1718a3b4d658a1672e24c081e36dd42bcaa74f03db39621afb7470822a28d
-
SHA512
e18cbdec3730e10cc0899853ba9369dc86d556559a037fe7c61234679a009da8c2d5c8621bd34f0a06e1d042b48719727529e1653a08d2e5ad49102aca12d8d6
-
SSDEEP
768:zpJcaUitGAlmrJpmxlzC+w99NB++1ouFqKKLHSsm8eeOuGyUy/PjbfydIW0K+U:zptJlmrJpmxlRw99NB++auk0kHDvuW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
87cf239da2f6be707863119899a51869_JaffaCakes118.doc windows office2003
lvCCIXbtbWa
KwGZnBwZBOBzin
rRccURw