Behavioral task
behavioral1
Sample
be6754d18e24897f8496d6a382ca30c3_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be6754d18e24897f8496d6a382ca30c3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
be6754d18e24897f8496d6a382ca30c3_JaffaCakes118
-
Size
67KB
-
MD5
be6754d18e24897f8496d6a382ca30c3
-
SHA1
ef19f32282da51f00e7b20d2de4ac576f834b184
-
SHA256
7f761228e0cffcec628a61e834de341332cd58c6133ab64dabf21cee76ba4ace
-
SHA512
18821570771b6b4534c2cdc64e47ef0799f6374116faacebf5d2eff6685f53e760475d87968a9d6aec5b0f94c122fd44419d5d1e21cf6e73043779a12f661184
-
SSDEEP
768:bpJcaUitGAlmrJpmxlzC+w99NBk+1oOHsN9J8M5X+UV9vk2sosN:bptJlmrJpmxlRw99NBk+aO83L9VG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
be6754d18e24897f8496d6a382ca30c3_JaffaCakes118.doc windows office2003
YzwwqHZAsAqRqM
rrcjfJjhot