Behavioral task
behavioral1
Sample
c23bb47d2af7f65d951b080e97d78410_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c23bb47d2af7f65d951b080e97d78410_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c23bb47d2af7f65d951b080e97d78410_JaffaCakes118
-
Size
34KB
-
MD5
c23bb47d2af7f65d951b080e97d78410
-
SHA1
326721f9bdf49e00f387a94c68205639794e4f11
-
SHA256
8dbb32b5d596f91fd5cc703e9d9803cb6e908360038da249959d1532d445385d
-
SHA512
9f4da3a30d1c27b73b980ee4d304b8dcfc1d28212911f99a2c7911f1296b1b1afa1fa54e9604aa56a14a0e6555e676986bee4c09f62db8a88bb33460061ea31d
-
SSDEEP
192:V6iyZEozyGc6ri5bv/0yl3B0se7Js2Yev4sJ9Os/8i32bU66J9K0M++pcp6yhd0E:VyyGcS2r3Q7JPAE/RGbPN++pcd0jp+t
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c23bb47d2af7f65d951b080e97d78410_JaffaCakes118.doc windows office2003
ThisDocument