Behavioral task
behavioral1
Sample
9370e96f7b3d30c4bff6b7f2846f98c4_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9370e96f7b3d30c4bff6b7f2846f98c4_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9370e96f7b3d30c4bff6b7f2846f98c4_JaffaCakes118
-
Size
202KB
-
MD5
9370e96f7b3d30c4bff6b7f2846f98c4
-
SHA1
af6a6df9fc50aa1eb28691b1feaa3e9bc06d5ed7
-
SHA256
c95a068e72de595a6e9b0c29bdc1745e87f2eb54eedeeb58c0fbf4fad9ce2211
-
SHA512
77034f612cb7c6a393497ffac842f6fc69e7cc94bf7e617292fc6535c8c3ce47d95b3d470ffc408638f3221256b1be1f62ef6feaa7be5d9e74c4685e09c2d673
-
SSDEEP
3072:wI1VJQBCpVT5slHjn25zWJ7ZdTtNIdzkRqbhh+rsrz:1VJRv5slHCWHdTsdzkRqbhh+gf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9370e96f7b3d30c4bff6b7f2846f98c4_JaffaCakes118.doc windows office2003
ThisDocument
pertinence
sashimi
wdung