Behavioral task
behavioral1
Sample
89312e34c4e092d22921f2f4317b0a41_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
89312e34c4e092d22921f2f4317b0a41_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
89312e34c4e092d22921f2f4317b0a41_JaffaCakes118
-
Size
35KB
-
MD5
89312e34c4e092d22921f2f4317b0a41
-
SHA1
7670a839a607a432d06ea9643e8f51b013dc2aa5
-
SHA256
0753a4f6b8dea6f2b509bd936454047571cf936fa2bb7a8261e14b2e0c093354
-
SHA512
3ebdfb712b9927403c70f6d22c2612e031267bb5d1a5d187d763f07b33d159df6a8685767bdd776373953bf907fe299373edefbbbea4ffe59f520ec49090fbc4
-
SSDEEP
384:eHfPjiS/ILJHRppii2jbE0ji3/lvI+fRIhCO+oONu62/2t7BZ+TE:Wf+RpTVX3/lvIORIhCyONu62/BTE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
89312e34c4e092d22921f2f4317b0a41_JaffaCakes118.doc windows office2003