Behavioral task
behavioral1
Sample
a22bfbad38293808717c3a05fc8af361_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a22bfbad38293808717c3a05fc8af361_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
a22bfbad38293808717c3a05fc8af361_JaffaCakes118
-
Size
103KB
-
MD5
a22bfbad38293808717c3a05fc8af361
-
SHA1
6d7351a541e96408847b06c02fe81d6ac1d0ef7d
-
SHA256
d406082f940da2ff3785021d0a11145cfc9f608d767d03eb1d2a5c1d19566c2d
-
SHA512
bc868096547704b88a9c002661f70a10ef8efd7267d07b43c59ff72ee7c9bc6f53b2251c0e032c3ff23ef3af021bdcbc9578e8287904e6c32794f4c249027c2b
-
SSDEEP
1536:dMPPdAyfxZ0/JZ+ag2brJC7DN2kdmLWlLyuPM1emqmLJjsxdfV2arJiLzVN8gyid:Y3P0/hbrEGuq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a22bfbad38293808717c3a05fc8af361_JaffaCakes118.doc windows office2003
Qljcplqh
AZQOujkCEf
GruTtouj