Behavioral task
behavioral1
Sample
39d6761ddaf380429983482affd0e8cf_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39d6761ddaf380429983482affd0e8cf_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
39d6761ddaf380429983482affd0e8cf_JaffaCakes118
-
Size
241KB
-
MD5
39d6761ddaf380429983482affd0e8cf
-
SHA1
25391ef801f11ad17e39ca72881359415188d200
-
SHA256
209702b2a3f15b57b69e94f0647e3e95123675e0d2460aed2e234d9633520d2d
-
SHA512
d3dc1e3a77be31965b4e31325af1b2e8b0b7674bde9fd8bd6e0fd14751f03891d173ee98db0caf30a917d980791d71bd895daab385d2036b0f7c05f0b24053ac
-
SSDEEP
3072:lTO+82ZXShPwXnzV1as00s1mXtEQ/ynnBDIeOz9pcYEQSQpPOe:DJS9UUsg1m9EIg9I79vPOe
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
39d6761ddaf380429983482affd0e8cf_JaffaCakes118.doc windows office2003