Behavioral task
behavioral1
Sample
41e3aa891e94f5460afc7e6424a3db05_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41e3aa891e94f5460afc7e6424a3db05_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
41e3aa891e94f5460afc7e6424a3db05_JaffaCakes118
-
Size
195KB
-
MD5
41e3aa891e94f5460afc7e6424a3db05
-
SHA1
b13b51e631f32c01b82013cb4240967dfbc0d8f9
-
SHA256
48e56ad67c78aa99784d56ba2f4e97fc967da8c0c74d234d1037a456344e98b1
-
SHA512
41712d830baf3de61570b130d07c13f2f478a891125df770e70cf25596df4f820273e267432ed91344dd4af56d5ab31a8f4a9018cfab89658e38263706bcf0a3
-
SSDEEP
3072:fFiV0zJjiN3ljS52R9yYZzSljw5KlAThn9t7CXJrkqr9qaPN:fW0zJ2N3RSLYZX5nnn+pk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
41e3aa891e94f5460afc7e6424a3db05_JaffaCakes118.doc windows office2003
ThisDocument
Js5zeb0
T3GrzBvp
SZ8De