Behavioral task
behavioral1
Sample
f55cfed9899df28c05d4ef66684b430b_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f55cfed9899df28c05d4ef66684b430b_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f55cfed9899df28c05d4ef66684b430b_JaffaCakes118
-
Size
73KB
-
MD5
f55cfed9899df28c05d4ef66684b430b
-
SHA1
e7a828575b50fc36edff120c9276d76f19d13f17
-
SHA256
5f2772868f53b97d456781f70a189e98093f9cc0884d3b99fc45c412d0174baf
-
SHA512
b2416559adfcad4068641db26101e165e0e34623da23a696558fce840aaaa6b52df4e8f51e44c364e7b1779e0a191c5d1dc7dbaba26774bf6766d0213013a3eb
-
SSDEEP
768:WUzHVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBx+1oVA2SWQd32ef2RGGrTb:WQHocn1kp59gxBK85fBx+aVdU2eiGo
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f55cfed9899df28c05d4ef66684b430b_JaffaCakes118.doc windows office2003
vfiQkVjmjUMaE