Behavioral task
behavioral1
Sample
374d87fe24ba0350012b57aba6ddaad5_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
374d87fe24ba0350012b57aba6ddaad5_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
374d87fe24ba0350012b57aba6ddaad5_JaffaCakes118
-
Size
369KB
-
MD5
374d87fe24ba0350012b57aba6ddaad5
-
SHA1
e277cbd086713223cde6167393c434a442f3a16e
-
SHA256
b7976c2d0e9462bd66b8d640ed1f36afb06d5d0e243608fb26d3ce50f2402cc2
-
SHA512
bc51e97d3709ff28d677579508b9ba27743ee71c7608f0f0b436ec70f1a31c0e6c4cecde3d3ff51544ec25bc5c37a26d7225e94c57abcebffe5b361c4e4970e9
-
SSDEEP
6144:kN7qRpkISJSRnnUda80x4HxNfl148ebvh9/tSU0Y0N756:XRpKJ2UdRN91eLVSU07NY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
374d87fe24ba0350012b57aba6ddaad5_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros