Behavioral task
behavioral1
Sample
0911713fc2ab17c738683b4241838c5b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0911713fc2ab17c738683b4241838c5b_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0911713fc2ab17c738683b4241838c5b_JaffaCakes118
-
Size
180KB
-
MD5
0911713fc2ab17c738683b4241838c5b
-
SHA1
4627cd4cd1d7167877093854dc1e82744da00717
-
SHA256
9f03d7a77802daf2719c2c2b0a80fa14279183a0071002bdf3393fe9d32f4365
-
SHA512
dbad0be463402c629b4719616f3ebfc85dce3ded23edbbe8f92f9ddeda4fa508deab47ae08ea286354ed62b9782010011c8338fede2a14bf392335ec9f8ef4be
-
SSDEEP
3072:7ZovQV9oNX4gBlyJyrOToBBphnjgWkqu0zRehh13N9s9Wh9:a4DoNog/IyHBBTnUWkf0lehh13N6kh9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0911713fc2ab17c738683b4241838c5b_JaffaCakes118.doc windows office2003