Behavioral task
behavioral1
Sample
1fc6542a08f906066581e486d4931dd3_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1fc6542a08f906066581e486d4931dd3_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
1fc6542a08f906066581e486d4931dd3_JaffaCakes118
-
Size
111KB
-
MD5
1fc6542a08f906066581e486d4931dd3
-
SHA1
c2bec360e481382d1c5523fcb3e1c48a3fe8725e
-
SHA256
fed9383bf8d2e750ba1a2949ae91d8d68e3a7da73f818b605ca639833ee8ea93
-
SHA512
44b8888cf946f45730ba148984b4714dc5f1f7e77548307ced0700f35a3173b30fe6414d4c450d07cc6db208371b7d6fe66c02a7cdcec22f8944ab56a64d8d19
-
SSDEEP
768:jrpt5Q5RcjHjs7aX1uz+cWs/+1ogMhrCsT5xUfTnsoLjKBZtv31:jrBQ5RcP/X0z+cP/+ag8vdMTnz+B
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1fc6542a08f906066581e486d4931dd3_JaffaCakes118.doc windows office2003