Behavioral task
behavioral1
Sample
c935b0050c569f772505600326e8eb0b_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c935b0050c569f772505600326e8eb0b_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c935b0050c569f772505600326e8eb0b_JaffaCakes118
-
Size
15KB
-
MD5
c935b0050c569f772505600326e8eb0b
-
SHA1
9d7a38a744ec03ba5339d9f19061aab32467c608
-
SHA256
503393e2d972ef87295107d6730458cf94352c9e4007e0071dc9f173928b6da8
-
SHA512
4eea8468392b28e0a1a792275a70999701c57f6deee3ae4a804e22d938ba7d440ca0f751beabf125d9120cfac5f438f0149f278ed3adb378c97892fe2b2cd213
-
SSDEEP
192:1qmHBnC670+x3G4fj60jEL/ZYuADjxv+pfc0ezATgCAkFtM3/EnaHNw:tHBnCAzfj60jgZ7Q+pk0ezA7AkFt2/X6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c935b0050c569f772505600326e8eb0b_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros