Behavioral task
behavioral1
Sample
c0f29133718ea1fdedae0cd59b08af95_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0f29133718ea1fdedae0cd59b08af95_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c0f29133718ea1fdedae0cd59b08af95_JaffaCakes118
-
Size
143KB
-
MD5
c0f29133718ea1fdedae0cd59b08af95
-
SHA1
c5c9de999db281986ac7b65a405959447f15cdef
-
SHA256
53c57d7c5405668370cbe26849d86feb25125e38d2914636992cf5bfbf9e0824
-
SHA512
cb165d0f6eb1b9495fb63c1dfb9847811b27f55a71e5d48eae7c06a00e7c4035a5f296dc325a9d667f20c97ab4133b5473538fc833383f09019d53a6c21753ed
-
SSDEEP
1536:rV81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadC+aXJuGwfOBvF:B8GhDS0o9zTGOZD6EbzCdbGBvF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c0f29133718ea1fdedae0cd59b08af95_JaffaCakes118.doc windows office2003
PfAGmOG