Behavioral task
behavioral1
Sample
d6be65cc62ff542df77ea583337f1c9d_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6be65cc62ff542df77ea583337f1c9d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d6be65cc62ff542df77ea583337f1c9d_JaffaCakes118
-
Size
206KB
-
MD5
d6be65cc62ff542df77ea583337f1c9d
-
SHA1
b5ea4029f8757f4a62fd1e02c5534ae7a6cc2d7a
-
SHA256
25fcb3ad48ba5134f1475421c549b86a289cedb9360d17d9ccc6d336eba0e2b3
-
SHA512
7c27272a5d7dceecfe7dd4afcc7d0cded7d492bfa0b8ccf05d81c07e80ffae719a5ef6db0583ad17929c6140b7aa71680d1228590a275b82f47a052b7b243fff
-
SSDEEP
3072:I6WkaGwrJOnYtBEXObT3h7k/XOTOtuLRpEr5yt0Hwy7tiUuf:6G/Y0+f1k/++uLR4NFq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d6be65cc62ff542df77ea583337f1c9d_JaffaCakes118.doc windows office2003