Behavioral task
behavioral1
Sample
42a2e8f0a6a7209c3bf9b00bb2a96a77_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42a2e8f0a6a7209c3bf9b00bb2a96a77_JaffaCakes118.doc
Resource
win10v2004-20241007-en
General
-
Target
42a2e8f0a6a7209c3bf9b00bb2a96a77_JaffaCakes118
-
Size
76KB
-
MD5
42a2e8f0a6a7209c3bf9b00bb2a96a77
-
SHA1
2c0fdc8e0d0c07d92abbf023e3803d13cd0935a5
-
SHA256
5409a5493b28cf879a05c8ce776436048f25e0bddc3bac3ff97e6a2b38a181e9
-
SHA512
c0a40d356a62d397941186a6d7704cc8315fa1fffc9576cf708f24034af4ff86a28f66b5f517a857b46da1651bcb1b115c91e8d8e6a02bafb782bd8f3858b444
-
SSDEEP
768:sATDVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBz+1oXdnYeY/++w9kdA:/TDocn1kp59gxBK85fBz+aXdjb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
42a2e8f0a6a7209c3bf9b00bb2a96a77_JaffaCakes118.doc windows office2003
SGPmtMOmvjEdO