Behavioral task
behavioral1
Sample
b7790bf4bcb84ddb08515f3a78136c84_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b7790bf4bcb84ddb08515f3a78136c84_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
b7790bf4bcb84ddb08515f3a78136c84_JaffaCakes118
-
Size
34KB
-
MD5
b7790bf4bcb84ddb08515f3a78136c84
-
SHA1
80989da980cf449079ebdc410668229df0099850
-
SHA256
de4b6ce4f534250c7bd3fb737ff9962a06c568afb57b38a823049b77c0a32cab
-
SHA512
9f4a8f5c0c934767721271a1417ee96f8f3d8fe404a6795583c21d10890e66f159f427c11a8350602c17a56f8737ea359a00a68b97508e37b96991db677977da
-
SSDEEP
384:2cc0viSY5Uz327/4E2vK3OpfiPy0jd8K2c7UQptteSo:2cc0pj20E2vK3EfiKC9N7UQpmp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b7790bf4bcb84ddb08515f3a78136c84_JaffaCakes118.doc windows office2003
ThisDocument