Behavioral task
behavioral1
Sample
4413f5c64aae4458b5697970566c25db_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4413f5c64aae4458b5697970566c25db_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
4413f5c64aae4458b5697970566c25db_JaffaCakes118
-
Size
78KB
-
MD5
4413f5c64aae4458b5697970566c25db
-
SHA1
ba4a041e0c0c80aaf39e13936547194f91ab1855
-
SHA256
78b25f1f64a2c1c12842a8b89d18a00f06a843ee92299901254ad25c53317622
-
SHA512
6e15f9404f6e567ba112486507ea78c98f30454613d1782a63ac80ddd1749edfd54633a923437c11e94938d9d8e5500a3477fe5e7995c7fc19a146f6e9ff7b1b
-
SSDEEP
768:2pJcaUitGAlmrJpmxlzC+w99NBc+1ocEZG88Z0trJO5nJ76rlWU:2ptJlmrJpmxlRw99NBc+acEczn16RW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4413f5c64aae4458b5697970566c25db_JaffaCakes118.doc windows office2003
smYFTTXPzic
ituXcZwVVLjcQ