Behavioral task
behavioral1
Sample
0c72173326cadf57c65274390b26f4b1_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c72173326cadf57c65274390b26f4b1_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
0c72173326cadf57c65274390b26f4b1_JaffaCakes118
-
Size
83KB
-
MD5
0c72173326cadf57c65274390b26f4b1
-
SHA1
27e98957ebab11d8b9533ad19a4650be5b3abf54
-
SHA256
5cd97cf47c9c825eabfb478d2f194c3c09422e62f8631fcfe216e6260591aefa
-
SHA512
63d75799c1b5de9c247db2f91cde678008b4f2d8d4c79bc9d4102ab45376c68b9df555e2cdddc1f8c8b35491ce8749de5d6095127cbd6f745dc79747187b37dd
-
SSDEEP
768:kDp4HVGeVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBI+1oUj48YCkjt1zLd+n:xYeocn1kp59gxBK85fBI+aUj4883cn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0c72173326cadf57c65274390b26f4b1_JaffaCakes118.doc windows office2003
aRhijomXKlQIfr