Behavioral task
behavioral1
Sample
34276565043e7597995d319a998ffa61_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34276565043e7597995d319a998ffa61_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
34276565043e7597995d319a998ffa61_JaffaCakes118
-
Size
77KB
-
MD5
34276565043e7597995d319a998ffa61
-
SHA1
bfea7c392eb2d8bd2f811b1e85bef46a86054850
-
SHA256
e7004ae96473ca509c3ae4dc101613e62e0b8f3a6656d9c2337c6266fed7e098
-
SHA512
de2e40f17333bebec507f636b559c21d4a71ce17a1ad46f9e2b88c771897e0bd51aa7243317ad092b4c3b0ec6c22b2bfdfe7e5607f6ca0f7ad6ac0cd4b6d0d46
-
SSDEEP
768:hpJcaUitGAlmrJpmxlzC+w99NBL+1o0uMx08QPhBT567D4Sex2Kr/60gU:hptJlmrJpmxlRw99NBL+a0pQhZ5q8Dl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
34276565043e7597995d319a998ffa61_JaffaCakes118.doc windows office2003
OajqOwO
ukzdvJklU