Behavioral task
behavioral1
Sample
014563a17a5638ed6c140ca6982a6b3c_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
014563a17a5638ed6c140ca6982a6b3c_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
014563a17a5638ed6c140ca6982a6b3c_JaffaCakes118
-
Size
129KB
-
MD5
014563a17a5638ed6c140ca6982a6b3c
-
SHA1
10183edb7e2e05e749b2698cff8a3b64e3cdc4de
-
SHA256
cd59e84745bfb55774901a9b9c06ad399da3216f8cc42f6eabf227176b78c432
-
SHA512
161430d7fa5d98bc43940e2a56e5fa9505b8269c17391b86771538dcfd49eb4663ea5d139dadf69d9a74a5f673b4cb5ebc4affde912662d1f53a168f67b15c63
-
SSDEEP
1536:ZaxEGgMCS76vGPYI+aJBBXBYQpa6QNWbyK1abTayutbKk66Hlr8GW39QRPFGTcyE:yBvmImsbeOA36oEL7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
014563a17a5638ed6c140ca6982a6b3c_JaffaCakes118.doc windows office2003
PAYfwiOjsjMi
FNawurQ
dIXcuNwCzVYmP