Behavioral task
behavioral1
Sample
93502370830741567ff1e0fed8ebf9c8_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
93502370830741567ff1e0fed8ebf9c8_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
93502370830741567ff1e0fed8ebf9c8_JaffaCakes118
-
Size
310KB
-
MD5
93502370830741567ff1e0fed8ebf9c8
-
SHA1
ff98f51cd71e7c8038278ecde05a5d5b28af0104
-
SHA256
dc8179919a4ab49317d8f73b24324da64afb8374a05c70445e8bacab703a62d9
-
SHA512
8b7e5d464fda2cf7216760ca54fb45d879203eb4137670739eb67c95b9380ca5fc6dc8731477a075e45da047ccd9fcff50f813a407265ea6c1b910ff7568a127
-
SSDEEP
3072:Mii8GxU1JW0YcksI2rqIkihsjM62DgMtsv/uHJCFspsMsLBAs4LsBb8IsV/swsZW:hJh5rI2rqIkim/MCVqBcWcX8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
93502370830741567ff1e0fed8ebf9c8_JaffaCakes118.doc windows office2003