Behavioral task
behavioral1
Sample
40d13c5d392f1643680d53dc3e533d44_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40d13c5d392f1643680d53dc3e533d44_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
40d13c5d392f1643680d53dc3e533d44_JaffaCakes118
-
Size
334KB
-
MD5
40d13c5d392f1643680d53dc3e533d44
-
SHA1
1c7dd48c2c3ecf46251973dd127e4e2e73667c1b
-
SHA256
6c26092706381c1ec4c5a095606ca79a5a9a3f519aae625bc80ff24d514459ff
-
SHA512
11b6047da7ef389e19e596b3babdcd47fc097b566720d8df0b8e461c7b0177b5339117a2b9869c7799e71f8da8380c10962a320e8f0add04c74ef47a418a648f
-
SSDEEP
6144:zLFpQBbhid/O0scgP3Ud0d5Ij150OkUFQFnTgYHa2twMr3FmASX:nFpahid/O0scw3U6ij150yATgY62twMG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
40d13c5d392f1643680d53dc3e533d44_JaffaCakes118.doc windows office2003
ThisDocument
XPcGOlF