Behavioral task
behavioral1
Sample
c963e50beec751108075c4974b1eb785_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c963e50beec751108075c4974b1eb785_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c963e50beec751108075c4974b1eb785_JaffaCakes118
-
Size
269KB
-
MD5
c963e50beec751108075c4974b1eb785
-
SHA1
2cf6d302ec409fb9d15f2de44148cb483b3d1377
-
SHA256
f76e67860a09454333719ff1c5078028bb17ac48921dbaf94cbf5a9a1cdce7bb
-
SHA512
bf3a676ba8d8ce76f74264fbd4a8cc3d94076dc827806a78b2db98b1f9eea483da72a5ac36042bda820ce41530d8a328cedf2c468159d2447111f8df0d8cb436
-
SSDEEP
6144:2quUbJxaVpzHOoUf82JsLjBVydH800broyRn0iV39go:2qDOVpCJsLjXWH80uroyRn0iVtg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c963e50beec751108075c4974b1eb785_JaffaCakes118.doc windows office2003
ThisDocument
cherrycoke