Behavioral task
behavioral1
Sample
042e50aa715576899debf589b99abeec_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
042e50aa715576899debf589b99abeec_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
042e50aa715576899debf589b99abeec_JaffaCakes118
-
Size
36KB
-
MD5
042e50aa715576899debf589b99abeec
-
SHA1
1c71f129a20ae1cef854d10d1ab749c8d73f91d1
-
SHA256
8b2ce8aa42f1889e121f5a04ebd7eda0d3729b38755d7266c503369400ad5416
-
SHA512
2960aa2210f8e23777273679ad74fec3fd40169ed36567aed0ab58aa71309f28a9a45d3b3b3d280f3d57b1af853ed8c8afc49ac3931abefa50dffce74cc6db2d
-
SSDEEP
384:C4Sk9AEsCTRqejxjWZ4yZrQDyhYPXxZ9Z73CT7t1XD63/RA0jZZnW5+V8iHpAf:d9xjK4ylQDyMXxjQLieGvVfA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
042e50aa715576899debf589b99abeec_JaffaCakes118.doc windows office2003
ThisDocument
AIWDepnz9
mNPDUjZ51
ek9fe4GP3
fMain