Behavioral task
behavioral1
Sample
13a4da3ffc7376f1e736157b0e1a554e_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13a4da3ffc7376f1e736157b0e1a554e_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
13a4da3ffc7376f1e736157b0e1a554e_JaffaCakes118
-
Size
103KB
-
MD5
13a4da3ffc7376f1e736157b0e1a554e
-
SHA1
67e842088d3b40cd77d815eb674c0d67b2a59cf8
-
SHA256
9c8ab8e1811cb56b280d5ea3515536a989b62e00a0e653541881d2407fbfd8d4
-
SHA512
08b818d85534c4c7c1885581c27779a02799d19752157673a4ab3db09bda75181f50d9cfe1cfa323a9350b5fd006632c2fce609e222840977e8d0d71bac058b4
-
SSDEEP
768:4qaT4ha7ggxX4wQLOb7PbBixjQWsy+1ogeMMBo83ekXFFDdtxghfEn13iUtV1VXc:4D7guIwYOzB5Py+agSOsma13iyz9bo
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
13a4da3ffc7376f1e736157b0e1a554e_JaffaCakes118.doc windows office2003
rAzWVtS
jmpJVPTbDEXHPl