Behavioral task
behavioral1
Sample
4477c4555e51a2f76305a30d67883332_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4477c4555e51a2f76305a30d67883332_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4477c4555e51a2f76305a30d67883332_JaffaCakes118
-
Size
14KB
-
MD5
4477c4555e51a2f76305a30d67883332
-
SHA1
0312a890c8ae6986619f69f6d09b6b4b2f0bdcbd
-
SHA256
75fa897da90bdf1006e4b828f429f61d048758f3b4b6e467571a9dff6be40cd6
-
SHA512
2676a8903b641b405968b9a758cc3be345775abb8c3971501597ee1defca22cd5244b01f847c401efd4559c86d4ecf8642ab19759facfd1e7af679bb027f704d
-
SSDEEP
192:hILWQwbJXYZ+34A0jh/Hdp893dsa+pcoxKo8PoICcQt2F/xfga:SqzliA0jxnQ+pF2Pof/tG/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4477c4555e51a2f76305a30d67883332_JaffaCakes118.doc windows office2003
ThisDocument
NewMacros