Behavioral task
behavioral1
Sample
41c443d018716c20f237dff3660c20c4_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41c443d018716c20f237dff3660c20c4_JaffaCakes118.doc
Resource
win10v2004-20241007-en
General
-
Target
41c443d018716c20f237dff3660c20c4_JaffaCakes118
-
Size
50KB
-
MD5
41c443d018716c20f237dff3660c20c4
-
SHA1
5bf4af3cb5e1e4c6513cab010b10c0a201a74e93
-
SHA256
e67d69bc73ece431afa82413cf87ad33c9b00d42405f75c26601d4b5d72636e4
-
SHA512
47fdfc337755c3d5833be91d8137dea831af060ada72df6eb1823ff30e76781a6a5d33c0976031480d3830f8cbeb09f33ff5d7c4979407f4f1f3bacefae2ca6e
-
SSDEEP
768:5BHh9nzIa/DXZ/3pHN/Ha/XSZTwW/P/PJ/29W/U7IQAPozKSeQGTx:5tnzIabphHNfaPSZTFXXJ5QIQAPoWS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
41c443d018716c20f237dff3660c20c4_JaffaCakes118.doc .vbs windows office2003 polyglot