Behavioral task
behavioral1
Sample
4882a34020e3471293c8dc6541aa76bf_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4882a34020e3471293c8dc6541aa76bf_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4882a34020e3471293c8dc6541aa76bf_JaffaCakes118
-
Size
193KB
-
MD5
4882a34020e3471293c8dc6541aa76bf
-
SHA1
50fdf7123cf9f1969977adac85e1e8b42206660a
-
SHA256
6e46fe28e291e32803de24e1b925761476e51ec8f9c676b51257611b293068d3
-
SHA512
f0605229017cc0b2c38f06f278a06b4b9cf94ee53cc34b3b2af0d0141429e185dd810f79c3450b2710a9ba1cab8d2aadb3715ea48a4b01f5705191d541bae5d9
-
SSDEEP
6144:5ZFDe7LmbE6TwlMpfl/qgM322F2422FRh++Qh9:5ZF678PTwlMpfl/qgM322F2422FRh++M
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4882a34020e3471293c8dc6541aa76bf_JaffaCakes118.doc windows office2003
ThisDocument
UserForm1