Behavioral task
behavioral1
Sample
37cc625df7e992089906e79d6993f0f8_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37cc625df7e992089906e79d6993f0f8_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
37cc625df7e992089906e79d6993f0f8_JaffaCakes118
-
Size
121KB
-
MD5
37cc625df7e992089906e79d6993f0f8
-
SHA1
a6067fe4b5daa4ea57980c7be1fbfd01601b7b69
-
SHA256
1e50603f821a842874f39e91f27f81ae513a1d8956e1dd4190a40c770023873f
-
SHA512
3898cc911453b6d043aaada593febb0002dc2d9ada1db6d135530a693bb12dcb700c1094dba2699300fbfaf31d737624599e5ca45a74fc6187931e16e4f89a20
-
SSDEEP
1536:sptJlmrJpmxlRw99NB7+aPpFkrUrjJbg7uy3ALv6Y95DYH8:ste2dw99fxrSvALv1mc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
37cc625df7e992089906e79d6993f0f8_JaffaCakes118.doc windows office2003
YlzUkLOBltvZR
WOoAoHmEU
hEYNACc