Behavioral task
behavioral1
Sample
4933ea4f94e7df5df8284b669851b925_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4933ea4f94e7df5df8284b669851b925_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
4933ea4f94e7df5df8284b669851b925_JaffaCakes118
-
Size
119KB
-
MD5
4933ea4f94e7df5df8284b669851b925
-
SHA1
5f11482c68cdaa0d9d6bf16f82f5a7d5877c0718
-
SHA256
2a69b28849c1cab2588319f10045294ea6d24bf160b895694cdbb1d308f7c5a0
-
SHA512
584ed60d4ae8e86e86f3ee2bbf2039e29db65805249c33ce178d8127e8fd4a1da65ddabc986e4873632898232d7cd1e8a6c349df13dc8c92216db66428b46ad1
-
SSDEEP
1536:sptJlmrJpmxlRw99NB7+aPhFkrUrjJbg7uy3ALv6Y95DYH8:ste2dw99f5rSvALv1mc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4933ea4f94e7df5df8284b669851b925_JaffaCakes118.doc windows office2003
YlzUkLOBltvZR
WOoAoHmEU
hEYNACc