Behavioral task
behavioral1
Sample
b598c5277c508b7d762fde2221333da3_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b598c5277c508b7d762fde2221333da3_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
b598c5277c508b7d762fde2221333da3_JaffaCakes118
-
Size
13KB
-
MD5
b598c5277c508b7d762fde2221333da3
-
SHA1
59186caab622504a25ae8dc2f43459988b4edd38
-
SHA256
76aa0d09418ef773afd8d6e839ccf316588ec8579ae81e2303f65a16f23bede9
-
SHA512
6f529e30362098c1ba82d10ca832ef77126c326b0ee80846cbec78ec4e18cb52b80cd0ef6d94c186b2a7e8e977ddf33fb9ca37fb9302c46401c75495dda08c6b
-
SSDEEP
192:Q4BDEi+jj7810uDwE0jCsdkiWmrag4yTX+axADj9g5Ktj1/cnxam:Qyv+ja4E0jCqWmraglcDCIt5/C
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b598c5277c508b7d762fde2221333da3_JaffaCakes118.doc windows office2003
ThisDocument