Behavioral task
behavioral1
Sample
a3c1b2d41ea80ac707833061c5691ea5_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a3c1b2d41ea80ac707833061c5691ea5_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
a3c1b2d41ea80ac707833061c5691ea5_JaffaCakes118
-
Size
19KB
-
MD5
a3c1b2d41ea80ac707833061c5691ea5
-
SHA1
7303082eebab7e4b7a4998a981457f57716bf347
-
SHA256
ec7b602a53cc72c9bd1d591d0a5f0460485cc97632fc74686f01864d3eaf8656
-
SHA512
b2b084a20225dbd36fee2c7e4d04422d964f416f546b521c23c8f62912bc92cd19f39003fa980073263f86635489a642a9478ebbb039152ab9223491e51163de
-
SSDEEP
192:HIC4SGA4wUpw878cJM8gw8f4+pftI3zIp5rpyo8fZJ16fa:J4NA4wUmRar+p1I3zIp5rpyoSb6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a3c1b2d41ea80ac707833061c5691ea5_JaffaCakes118.doc windows office2003