Behavioral task
behavioral1
Sample
434a1d56e4310d7cb5cf8355ad600446_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
434a1d56e4310d7cb5cf8355ad600446_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
434a1d56e4310d7cb5cf8355ad600446_JaffaCakes118
-
Size
84KB
-
MD5
434a1d56e4310d7cb5cf8355ad600446
-
SHA1
eae09a362f02508b34e5038d4395412039d22ec2
-
SHA256
614fdcaa9072f13d068c617ffc642d57a5f78332158112fc1ef1c2142c4f1b9e
-
SHA512
33fe06ee4b1df350a12cc39fd3eee9b5fc97a7829a40c4dd603a9ba5d72adf041c924f367ee040df19a90c0dd2ccafe90b49cae8ce366e9ed546a8e4254d7dcb
-
SSDEEP
768:1ylsgKwBcay+4ypLTEUCbJ54UmF/3ytZW9D0ic70kxBkAfvrE7MU6wo9sgQTn:o9KRayOQv4jF/ya9IrfkAfvwoUXo9e
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
434a1d56e4310d7cb5cf8355ad600446_JaffaCakes118.doc windows office2003
ThisDocument
Module1