Behavioral task
behavioral1
Sample
3461b349ea2d55cf7e7b07dc2b4297c1_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3461b349ea2d55cf7e7b07dc2b4297c1_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
3461b349ea2d55cf7e7b07dc2b4297c1_JaffaCakes118
-
Size
112KB
-
MD5
3461b349ea2d55cf7e7b07dc2b4297c1
-
SHA1
583cafe5622411b87bd9cf5a3ae1998cdefb3208
-
SHA256
32522580050b3a9798cd539a1b1034dcb600540405449ca66b8d2f836c547c2d
-
SHA512
1c7d5f08686c858ae2f41fb2f29278697f4555b6ffc532ced8f6aa07be9749588ba020c1f83c6675e138a0e4e71b2651d22fe64ff0188cd53760375fc15f9328
-
SSDEEP
1536:TTxjwKZ09cB7y9ghN8+mQ90MTn+abvmhkULj3iyZFYJ0PiX4/7e:XxjnB29gb8onzmVWyZFlaAS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3461b349ea2d55cf7e7b07dc2b4297c1_JaffaCakes118.doc windows office2003