Behavioral task
behavioral1
Sample
36e93c172f6945863414127265b7a706_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36e93c172f6945863414127265b7a706_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
36e93c172f6945863414127265b7a706_JaffaCakes118
-
Size
100KB
-
MD5
36e93c172f6945863414127265b7a706
-
SHA1
1f32f28b0a5bed4e6d9ebceda0b24198d7ff9b08
-
SHA256
b94669b74ea10b348b3f74fb3236352bf715ec2be4916022d544ab24e26cce47
-
SHA512
b474c28d6253d368967281fe6f6150b17cd006101c807ae68b0f15e7609c9e72975ba7b6c47a619695cdf2752ce6cdea239bee47e39fe1b3850528f689afb349
-
SSDEEP
768:+186Vj4AmvMkHcLoY8GYbe+1oJGrzAkkvJfYRddD4e878BVa99llZeKTGFv56qc:+1r4AsTHcjZke+aJe9aMP878SQRF56P
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
36e93c172f6945863414127265b7a706_JaffaCakes118.doc windows office2003
iIwBPoqiJJYi
uSAKVzYqUrIlz
FdJhHEQSpmNGY