Behavioral task
behavioral1
Sample
424499a609f0ffc7f0bc249b1c2a7003_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
424499a609f0ffc7f0bc249b1c2a7003_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
424499a609f0ffc7f0bc249b1c2a7003_JaffaCakes118
-
Size
84KB
-
MD5
424499a609f0ffc7f0bc249b1c2a7003
-
SHA1
dcda5efa5eb2cd9dda36fba5a8a8dc196da7c016
-
SHA256
97290132936435d360093e61eb0f42e1ad5c51b40bcf81a0d7f39423bf087c3a
-
SHA512
d956c94f5131fc2b749ad52e968f5fb9ee0aa24fa4ae5f876047a82b9e954aa56b809b4b119c0b7a3105adc405a9470ae478180de650b2b44eed5f26eb0a377e
-
SSDEEP
768:hpJcaUitGAlmrJpmxlzC+w99NB55D+1od2rUPJuogB+/sDy1IDJynMviAgpLApk:hptJlmrJpmxlRw99NBj+aDAWWyndA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
424499a609f0ffc7f0bc249b1c2a7003_JaffaCakes118.doc windows office2003
TmlhWiDUrYf
adKHRXzJGpZc