Behavioral task
behavioral1
Sample
21bb6720e94256faa0b001a035f30daf_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21bb6720e94256faa0b001a035f30daf_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
21bb6720e94256faa0b001a035f30daf_JaffaCakes118
-
Size
184KB
-
MD5
21bb6720e94256faa0b001a035f30daf
-
SHA1
aca34c75fcbacb0841f8d276f697079b2e67a32f
-
SHA256
b001033a0916c341c84aa457e4c1e0c30342d23a24faedce97350f6e52dbedf2
-
SHA512
41dcc1f246918afc3ae2c12d4f18024d854509c6e9946cfbfc2162ce11540d6eb077bf746a78da308b2a28f1d09605e50f5b2886a973e62e822b656079bab91f
-
SSDEEP
3072:5VNx3L9Q7YV/o5Do7HR/GfFPlYvPo6cuvCCPouiZ1ooaJW1mz+snoh6G56cmRtz:zNxbC7YV/omalYvw6cuvCCPouiZ1ooaF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
21bb6720e94256faa0b001a035f30daf_JaffaCakes118.doc windows office2003