Behavioral task
behavioral1
Sample
cff31a62b725aa0d1c1af029645ff191_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cff31a62b725aa0d1c1af029645ff191_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
cff31a62b725aa0d1c1af029645ff191_JaffaCakes118
-
Size
122KB
-
MD5
cff31a62b725aa0d1c1af029645ff191
-
SHA1
ecab9b5c42d453688fd8da8eadb1862468aee16a
-
SHA256
0f7f676c612f9888569154133ff03bc9fbdba589be8e5335f0dd8b5cfb7de0ad
-
SHA512
cf26b1618b44cb7ace708f95849a43eabc8937b2cd4da4af2466e17fc453b5ae6369b2b5c5b4f6692c39f5d309dce59c0c3a5481e642115a9873398ecf77f92d
-
SSDEEP
1536:+bUa7iaJHwTlXkswk4O62tlmJAq+poSgrAuyUlNHcgjjxPTWcJoRNqrfJYgoTvB:OkCVNRlriRNqjhoTvB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
cff31a62b725aa0d1c1af029645ff191_JaffaCakes118.doc windows office2003