Behavioral task
behavioral1
Sample
012653803b956165ce9142668e38b223_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
012653803b956165ce9142668e38b223_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
012653803b956165ce9142668e38b223_JaffaCakes118
-
Size
228KB
-
MD5
012653803b956165ce9142668e38b223
-
SHA1
bf8f2637614b1b2eaaee8360405e9c2497ed88f2
-
SHA256
86b774067ba5911413c1125626056f32d4e076c0c15aa38e78c606573b3f730e
-
SHA512
c55dfd9283ba280898b7ce92cbfdf960c14870fead21a44e0556a8f004dbfc95d2c46e36af16150f2e9fbfc213ae61442de7536e91ea73f9a47659c0935ccdf7
-
SSDEEP
3072:y6W2fq9MLCvYg5usxh6cxkRgE012vAvOAhGf1dedeZJsuC1180MaRnh:A9MI5uGgcxigEWv74fT9iuC/IQn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
012653803b956165ce9142668e38b223_JaffaCakes118.doc windows office2003
ThisDocument
wVnBiCK
wnQzNqndzClD
LDiCILFmBDjjR