Behavioral task
behavioral1
Sample
397c215cf41ef598e7f29f2b08c4d9d2_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
397c215cf41ef598e7f29f2b08c4d9d2_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
397c215cf41ef598e7f29f2b08c4d9d2_JaffaCakes118
-
Size
9KB
-
MD5
397c215cf41ef598e7f29f2b08c4d9d2
-
SHA1
98abaa89fdc0fe737409609391ecb7502be6577f
-
SHA256
b525790c5928a16fa8cb3176fa695d927a4bde6e43ea05c3f1995f006c44534f
-
SHA512
0a681fc1cbb2ecb6aa60492335492e51e7cdf1370b8ee84fc83a48b1881613aeb0d69f53446ffdd69cec21fe8ffb9cfe66246b09c1daecf9caed639a96bc6fee
-
SSDEEP
96:twyU4WQshcVHgh6Y1ArAyY1vL+f0jlZLnAOUVlrozta5uIStqhBzoqYqqaIi:tWhca1Ar0Q0j3rrAlcztw5/rY9a
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
397c215cf41ef598e7f29f2b08c4d9d2_JaffaCakes118.doc windows office2003
ThisDocument
Module1