Behavioral task
behavioral1
Sample
4320415a9b2cbbd05146ddd2facdd549_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4320415a9b2cbbd05146ddd2facdd549_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4320415a9b2cbbd05146ddd2facdd549_JaffaCakes118
-
Size
165KB
-
MD5
4320415a9b2cbbd05146ddd2facdd549
-
SHA1
8f2204d7bf33cafbfd018992646131a940003699
-
SHA256
69911db30fac3233862b4c74defd879a60b70912b4f2c932a5cd36bad8752454
-
SHA512
4739431edb45d36c26f225ac958ec2ae2f872462bb7a80fcb6c42dd05850a1798c91295e6c490bb13264449c1a1cb0c48472cf20a9bc48884e956c8da03f20e1
-
SSDEEP
3072:ExjnB29gb8onvGflvQjDic88w065Zh69txcqYtl7vtWQAO:ExyhQj7Hw065Z4x3Yb71W
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4320415a9b2cbbd05146ddd2facdd549_JaffaCakes118.doc windows office2003
mGdSmnqnOajOVF
tVFzKwwwIQX