Behavioral task
behavioral1
Sample
41509e3398b66956b85717ff61e9bbd7_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
41509e3398b66956b85717ff61e9bbd7_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
41509e3398b66956b85717ff61e9bbd7_JaffaCakes118
-
Size
165KB
-
MD5
41509e3398b66956b85717ff61e9bbd7
-
SHA1
5acdd04c86e79860425ac8ee3f876aa2affe4f54
-
SHA256
3f9af4e6e5f41fb9b40e176a353ca083a3aa20ae01f96ee883603b3540b7710d
-
SHA512
1dca62b7d91681e054f16970f31d23d947ddb5907986db44cfc9e35777af5d40f3a6a871a61c0cabebfd1dc9921b1074a462a918c16ee04e8dc8b4e3a1ee6e1e
-
SSDEEP
1536:6AODZ0EdsBNgXj/GI+a9F6sk434o4TUQrS0oI2owAm+53g8sS32ywE0RXrFgSwD4:3EdskjFOTUQr38A5g8sS32yyrFg3Il1X
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
41509e3398b66956b85717ff61e9bbd7_JaffaCakes118.doc windows office2003
PKiIXWjt
zWjVraiFopt
NGwoPIXGzDvR
qGLctTBZzTWC