Behavioral task
behavioral1
Sample
4f80c2f27d48affef92c1e7278d62554_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f80c2f27d48affef92c1e7278d62554_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
4f80c2f27d48affef92c1e7278d62554_JaffaCakes118
-
Size
265KB
-
MD5
4f80c2f27d48affef92c1e7278d62554
-
SHA1
e3294dafaf79a0690cfc4bc743f72be6ad3db33f
-
SHA256
a61f60d864eb3d592bf31ec7980909efa1efc22a33bf2142eefc017a9b6bc827
-
SHA512
254f191c1d884f8209a67a8b0e95a8ab2d88e5bf1c684943434f671a0d0b32998405e17d77c1dfcf66c6da671de7d484581641f0fa691483cdc608630b73458f
-
SSDEEP
3072:7khgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYPy+SrvFUBU:7CwQK3RpVS7G4SVuz1QzLhxztsZGPwt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4f80c2f27d48affef92c1e7278d62554_JaffaCakes118.doc windows office2003
ThisDocument
LhyvCR
yyCuJDEjQ
yM1V6EqB0
f