Behavioral task
behavioral1
Sample
0d0e91350871b98b42ff49244e43f90b_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d0e91350871b98b42ff49244e43f90b_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
0d0e91350871b98b42ff49244e43f90b_JaffaCakes118
-
Size
80KB
-
MD5
0d0e91350871b98b42ff49244e43f90b
-
SHA1
e6c85f7495b5572573ad35889ec788d8cf2cb796
-
SHA256
0a46c633194ba1307443b0f76702d2bcb5185daef39153d6f3ce1309679d57d2
-
SHA512
e76a69e129242013e48bb6935f7d339f3f833364727f19f1843fb77e48f9db008b020a9cd77be6d8ceeedb52361437f296418d1a78b4a2b6b5c6ff8db5ce2ede
-
SSDEEP
1536:W3Tocn1kp59gxBK85fBt+a9gP30XZRhYx8xTh2hghoxmRUxI/WHxl:W841k/W48iP3chYx8xTh2hghoxmRUxIA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0d0e91350871b98b42ff49244e43f90b_JaffaCakes118.doc windows office2003
DWmJTwPZ