Behavioral task
behavioral1
Sample
4167f7c05b3d9c3906804028bf7ede37_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4167f7c05b3d9c3906804028bf7ede37_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4167f7c05b3d9c3906804028bf7ede37_JaffaCakes118
-
Size
82KB
-
MD5
4167f7c05b3d9c3906804028bf7ede37
-
SHA1
e4cdf4c602ed7074c7a29173c507da0f7f7d947c
-
SHA256
ec49ca7cc91f2bacab2b6f8121caf22e3099f50aca0007dd87388ba2c443d845
-
SHA512
64adb467ccd404b7b39981019523cf6b9241882a4e59569fdba83e6f3288d7025c19b1ead07f0f69af1a4689773be9eab044ae8db25860425d15414df9320f48
-
SSDEEP
768:SJOVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBZ+1oQAb8gLyVvHKyoZXrQ/iJw7o:gOocn1kp59gxBK85fBZ+aQuFDyg0i64/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4167f7c05b3d9c3906804028bf7ede37_JaffaCakes118.doc windows office2003
LFvMOUDH