Behavioral task
behavioral1
Sample
3af9b4d45c471dea5dec64a20481ced2_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3af9b4d45c471dea5dec64a20481ced2_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
3af9b4d45c471dea5dec64a20481ced2_JaffaCakes118
-
Size
68KB
-
MD5
3af9b4d45c471dea5dec64a20481ced2
-
SHA1
b805ec35fd29a285b1f85770716f4372512aaf7d
-
SHA256
55df3a5cf03f2b821c0a851c5041fb11935afb5d97a13f4e6d00108809493d83
-
SHA512
f9bcf9a9a8d71cab2bd2cbc493a48bc3e6589fb337a4e42f775ae9a8752e58c1d129fcd471bc77ade59119f2ea08df6e8db21abcf6cc64ddb61f2a49fcb14438
-
SSDEEP
768:aVsDv3GdMRjZ7RZmfZ00oDpEOUb+Y5butcJWDTN4EFwxfw4W8tvq7BqgIYo:ayD/GKjZ7R8fZ00Yrb75JOx17h
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3af9b4d45c471dea5dec64a20481ced2_JaffaCakes118.doc windows office2003
ThisDocument
dzolyha