Behavioral task
behavioral1
Sample
4c4e290d6df332bd3a3e2d00e52c3866_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4c4e290d6df332bd3a3e2d00e52c3866_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
4c4e290d6df332bd3a3e2d00e52c3866_JaffaCakes118
-
Size
16KB
-
MD5
4c4e290d6df332bd3a3e2d00e52c3866
-
SHA1
faaf09dbaeabf200caeb7c6868f011438f66d403
-
SHA256
aceae43aec96f8da9a417e57c544f601b0c5658f65887559ab0fdaeba813db9d
-
SHA512
55a5a53c6a342b71c31eefb2b86a813a92983d9b478e05eeaed27f959fffbdf41cb13d137f99624d818d7054219b59e8d7f857df4362f2aac1a2f60c955af617
-
SSDEEP
192:ydaTWr5lywH82LktsJB5TKV7nhhcN0r7qqmGhPxRzIOxwN/Ta8CQ7o:YayrCy8ykbVl6NQbmiPwZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4c4e290d6df332bd3a3e2d00e52c3866_JaffaCakes118.doc windows office2003