Behavioral task
behavioral1
Sample
34e35c301aaf6f72ae510cb2424da473_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34e35c301aaf6f72ae510cb2424da473_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
34e35c301aaf6f72ae510cb2424da473_JaffaCakes118
-
Size
70KB
-
MD5
34e35c301aaf6f72ae510cb2424da473
-
SHA1
a042d336d212e603217710e4f031782ace3696d8
-
SHA256
70f4f95d8befcc6b01038fe7d0eadadd264129968ec3d4030b4e5ec6d977cb7d
-
SHA512
e92103aa99edea6cee468b5c67e13a6e27f42763e0f7b03886efb7a9793f8fb91f16f20db8463dfb2de6fec4aaeb54a23e9020f0f850a487391cef0d4f7566a0
-
SSDEEP
768:jpJcaUitGAlmrJpmxlzC+w99NBy+1oXTnPZikvlZiu1iXBFjGJ:jptJlmrJpmxlRw99NBy+aXTnPnLNixM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
34e35c301aaf6f72ae510cb2424da473_JaffaCakes118.doc windows office2003
LiaUosZFwXaV
qujmYfqwCmpk