Behavioral task
behavioral1
Sample
146c64ebe2b539d939c1fe1861857e24_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
146c64ebe2b539d939c1fe1861857e24_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
146c64ebe2b539d939c1fe1861857e24_JaffaCakes118
-
Size
49KB
-
MD5
146c64ebe2b539d939c1fe1861857e24
-
SHA1
f5e74e02f26d589b3f3553e81f39058b2e80cbcb
-
SHA256
c02dba2f5b5b9f2403b4203e00f17991ada069da6f038d3d77a3a1cd121ae09c
-
SHA512
54cb33046a8576c0165ea4b489ad62fe412f45f921df539898a822fc8a098d83a0254c886f6bdda3ae38837039dbf057184f6dd82d137f3129082717cc058ca0
-
SSDEEP
384:R84Ybs9riSeav9LyGm8iyvhSBjoSnJ7ytcvjFX0c+tyjzQso91WnX0jHd:LoY9LTmMIkSnJzkcayK6E
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
146c64ebe2b539d939c1fe1861857e24_JaffaCakes118.doc .vbs windows office2003 polyglot