Behavioral task
behavioral1
Sample
87e5abb88ee218f501e79189cc67e412_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87e5abb88ee218f501e79189cc67e412_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
87e5abb88ee218f501e79189cc67e412_JaffaCakes118
-
Size
42KB
-
MD5
87e5abb88ee218f501e79189cc67e412
-
SHA1
f81ccb076c6541ef1fe10f26cf57b380d0710d30
-
SHA256
0e9920b6a85fe7c5c256ac6449d579321d5993dfb0abd2ebb7498895ac5b331b
-
SHA512
9e29e320c829c99ecedb842c6adbde4247ac30f3da5bfea210aa5075495724e988bac90b6c1625cd5906f69f593689815e7e696b19c4d52eae11788bedfe1252
-
SSDEEP
768:gtrclm8HRolKSN2cTE7h2O0OMRNup2IA1DbxXm44DNnLFLu:gtroHRolKSUcmqOMTu4ICfJm4qRF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
87e5abb88ee218f501e79189cc67e412_JaffaCakes118.doc windows office2003
ThisDocument