Behavioral task
behavioral1
Sample
4438869e5b230540ea88cef12bf50615_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4438869e5b230540ea88cef12bf50615_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4438869e5b230540ea88cef12bf50615_JaffaCakes118
-
Size
193KB
-
MD5
4438869e5b230540ea88cef12bf50615
-
SHA1
1885a8e746e45011c489add4cc86b7ff4ee97a40
-
SHA256
ae1f0ba2a5b3e728112a6d2d90fac0971d86c58a46470e1faa9ca3bb7f1a89a9
-
SHA512
0fe4de16d7d4f824c9c540d52cd0986ef7f6f2e4214693e9811c04061fe3cb4a51b09ce552f1c2057f099dc56f3c9ed6e878db5459cb41cbce95af90e6c37feb
-
SSDEEP
3072:zte2dw99fRXcd7ThEDy+37bQbQnPjPA0fpt36Tr8MRJYwz/CF:BHdw7Jcd7T+/rUbOPTAGPqTRYwz/0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4438869e5b230540ea88cef12bf50615_JaffaCakes118.doc windows office2003
QtWikWz
AwIIPVh
tFOTCfzWYcwFD