Behavioral task
behavioral1
Sample
48ac2eba158a7338ffecfd54f119df67_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48ac2eba158a7338ffecfd54f119df67_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
48ac2eba158a7338ffecfd54f119df67_JaffaCakes118
-
Size
81KB
-
MD5
48ac2eba158a7338ffecfd54f119df67
-
SHA1
b37ab68b637a248da742e30f0e417108060f2ea6
-
SHA256
8b40d61dc6a8023693d9c026b51f511888a44e96a883a2584435365dc9b8cff8
-
SHA512
a1398648ea1c6a473f56d1720ca4375aef551b15b6c3a856a6b95de8f713e263a4d006a504ba3bf663f9871655b14d2c438d2ad5fab298ab9ab424fba9709bf8
-
SSDEEP
1536:W3Tocn1kp59gxBK85fBt+a9gP30XZRhYx8xTh2hghoxmRUxI/WHxl:W841k/W48iP3chYx8xTh2hghoxmRUxIA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
48ac2eba158a7338ffecfd54f119df67_JaffaCakes118.doc windows office2003
DWmJTwPZ