Behavioral task
behavioral1
Sample
7347b8b482d4185b9e80b7013ced1019_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7347b8b482d4185b9e80b7013ced1019_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
7347b8b482d4185b9e80b7013ced1019_JaffaCakes118
-
Size
653KB
-
MD5
7347b8b482d4185b9e80b7013ced1019
-
SHA1
2a74cb315082a3729d80ebde02757b7e7ed5ab3f
-
SHA256
f0477ac3d6076130fdb7feb394b84994421484e70674a303b063168d4fd59d10
-
SHA512
09080b8756e6d3b8d121461e9a1b7d2347df09dab20fd8913aef76da39d457a8613edab7ae30c942d04455dc78eacbad6d0e2b838c748d192088817d9ef0d17d
-
SSDEEP
12288:nuvKkfP+nEhsv5BcQsNeKvix7unLpdlo5CXmobj5Nnz7X:n+KkHq5BchNe0k7uLpb8Qmobj5lz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7347b8b482d4185b9e80b7013ced1019_JaffaCakes118.doc windows office2003