Behavioral task
behavioral1
Sample
b32d967d7edc07d99b55230add746849_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b32d967d7edc07d99b55230add746849_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
b32d967d7edc07d99b55230add746849_JaffaCakes118
-
Size
84KB
-
MD5
b32d967d7edc07d99b55230add746849
-
SHA1
ed64498d29f40ccc07c7fbfa2a0a05e29763f5e2
-
SHA256
9a1eb53df4d78dc1896b3dfe00ed0818391b12593cebf80b71b48b3623c28de0
-
SHA512
548c09142c363313c89229e08dc4555897ed8b153c15a5a89efc4d624dc6953b90c574b04e114e23d6866c549b18e64141493e826a577ebaecb59e031dbe04b3
-
SSDEEP
768:hpJcaUitGAlmrJpmxlzC+w99NB55D+1od2rUPJcogB+/sDy1IDJynMviAgpLApk:hptJlmrJpmxlRw99NBj+aDKWWyndA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b32d967d7edc07d99b55230add746849_JaffaCakes118.doc windows office2003
TmlhWiDUrYf
adKHRXzJGpZc