Behavioral task
behavioral1
Sample
3fc1f418256e8de34c3d6da26e774221_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3fc1f418256e8de34c3d6da26e774221_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
3fc1f418256e8de34c3d6da26e774221_JaffaCakes118
-
Size
266KB
-
MD5
3fc1f418256e8de34c3d6da26e774221
-
SHA1
5fc1a6d6ff27b481db00ca4050401e67b2361064
-
SHA256
3a99afbc8bd002e1dce326e8e89525d93b7787e016aeea4ac1e36115286f35e8
-
SHA512
c709ba0499555d0953937f2e0bf195e27c2320226cbc399afc5848e495196954fab770ed64025ceaaa988ba865b3b68997b44962ebf0ac75cf4e272ddbaf496b
-
SSDEEP
3072:VkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYCUB5BEiudV:VCwQK3RpVS7G4SVuz1QzLhxztsZGPwa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3fc1f418256e8de34c3d6da26e774221_JaffaCakes118.doc windows office2003
ThisDocument
sIpNl0ZEt
iDiyq
NoRnJ
f