Behavioral task
behavioral1
Sample
db1dda0772c81f143e71e55da4564d95_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
db1dda0772c81f143e71e55da4564d95_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
db1dda0772c81f143e71e55da4564d95_JaffaCakes118
-
Size
109KB
-
MD5
db1dda0772c81f143e71e55da4564d95
-
SHA1
7217dd2c9da7dd0129fefaecd65a98561a3c4010
-
SHA256
0d8ad63d513a9b6f03056a3134b3c258610771388215e2c5e7b08233bf2b1ad6
-
SHA512
ba1f07d19e025ab42187af56f04e0b7d7dcfe74d805ded5a725acb1f4b7277ed8e791704e6876b51e6aecc9b80181c89d8e363ec898c76f45eaf2818017e571d
-
SSDEEP
768:p3th9csVk6tWdmUx7mOUPwAy91LSi4TSUaThfFlNGD0xz99EQ:p3pZkscv7mvPw5qi4TSlThDNGD03C
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
db1dda0772c81f143e71e55da4564d95_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros