Behavioral task
behavioral1
Sample
b3947d927d425915f37a0aa9f9c47da8_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b3947d927d425915f37a0aa9f9c47da8_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
b3947d927d425915f37a0aa9f9c47da8_JaffaCakes118
-
Size
31KB
-
MD5
b3947d927d425915f37a0aa9f9c47da8
-
SHA1
e76db8c783481f4866fdd8348979424bc5a612dd
-
SHA256
13d7d4fcabc15b65552090e081017559dad09bcf5e8f3e047953037db50dcdf6
-
SHA512
62581dcc640f4f413f65b29da7d5669f1fac7fb0f1613ffced1c96696c0978d447956ecfe13d242000574132b9635975c30561fd0d1c9b972950b8a166854a6a
-
SSDEEP
192:RAxlxZEvALw6/6rrILd/Kf3HO8tneWOEG/y0jEkRPtzc/EPxSWfE50CrsMa:RQoiSUR/8dnMpy0jEcPtYE72ns
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b3947d927d425915f37a0aa9f9c47da8_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument