Behavioral task
behavioral1
Sample
b3912a895701a8b5aabc9b8afeab24c1_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b3912a895701a8b5aabc9b8afeab24c1_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
b3912a895701a8b5aabc9b8afeab24c1_JaffaCakes118
-
Size
77KB
-
MD5
b3912a895701a8b5aabc9b8afeab24c1
-
SHA1
312dd50009a65003ef4920787d217b60e27e7639
-
SHA256
53d1ff5cbbeb0a400b6b6ee16fa4dcade3887420f7f4d6038ce51bc5c643f77f
-
SHA512
86fe42306e154afb9750245b1b12c8f39c0020aeeb3702ebc8364fcb0c888ad747438ba0835b18af48c6e70d8a9ca9393cf56f8aa068df7a69398a0d93437768
-
SSDEEP
768:XTpJcaUitGAlmrJpmxlzC+w99NBk+1oAfkIIsGhrAfsL940Rx:XTptJlmrJpmxlRw99NBk+aA/s3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b3912a895701a8b5aabc9b8afeab24c1_JaffaCakes118.doc windows office2003
tiISCCF
DoapfFdmjdBQV