Behavioral task
behavioral1
Sample
4f9284d52e033729c515b13ed4b5e578_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4f9284d52e033729c515b13ed4b5e578_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
4f9284d52e033729c515b13ed4b5e578_JaffaCakes118
-
Size
991KB
-
MD5
4f9284d52e033729c515b13ed4b5e578
-
SHA1
d5820eddc08bfbaac4385084900dcb2330bc724d
-
SHA256
88e27ebe9189adf4255ae635c704070c3f10d02997e51475f736f69243b93c8c
-
SHA512
45749fe4b47e38a55c05045576df83634b2d035428c8e03117fbba3bd2acd04e07b6fbc2efd8f2631a7db28f993998a7137a007c6e1ff15462545a955a4c192b
-
SSDEEP
12288:zMOSwrGXU0gSnHuFFs0hNpAnbooCkMcLKqS4ppGPRiMBJ6pCsJIXgM4LLyVRI2S6:ztsU0gsGFZ7Wnb59o2R6vNHTr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4f9284d52e033729c515b13ed4b5e578_JaffaCakes118.doc windows office2003
ThisDocument
HRvZvfr
UserForm1