Behavioral task
behavioral1
Sample
4c30e792218d5526f6499d235448bdd9_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4c30e792218d5526f6499d235448bdd9_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4c30e792218d5526f6499d235448bdd9_JaffaCakes118
-
Size
3.4MB
-
MD5
4c30e792218d5526f6499d235448bdd9
-
SHA1
8b599ecdbec12a5bd76cf290f9297f13e8397d56
-
SHA256
55f8d95fc330b1e9519dc572e4acf8e751387c090f7a640b8ec0257a006212bb
-
SHA512
f6101f7f7d7021ca9a1060b5e1bfc261480018f3adbf7a77f0ac31b6a157795ad2c1ab1b97cf1947ceb9383c3ea8dbedb397708ec5fbf004387be43c2b267024
-
SSDEEP
24576:iS+y/hk+mXOS+E8qriH+SFMmO0e/zWahbZSYP/6gayyX8Rigiy5aQa8ohmzcGfDM:SsdK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4c30e792218d5526f6499d235448bdd9_JaffaCakes118.doc windows office2003
ThisDocument
Module1