Behavioral task
behavioral1
Sample
07e2b3e0e492326b3a0558f60da9b015_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07e2b3e0e492326b3a0558f60da9b015_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
07e2b3e0e492326b3a0558f60da9b015_JaffaCakes118
-
Size
15KB
-
MD5
07e2b3e0e492326b3a0558f60da9b015
-
SHA1
47304c99dc78fc847bebe17409fa3cd4549e4152
-
SHA256
acff9d7de4ecea43b810a8c80c59e04a921d95a3394c0655bc400b812fc672df
-
SHA512
499ce0838c2c6da9055e21bdd6c480e4f8bce276550c2327fc1fc562814fcfe6865a6c168578ce25fa9c5ca345ec439e36efff3672901590a773e2d13f7f0794
-
SSDEEP
192:npVthmqEB0/oE8w0+pyRdjiHFd8sgWrbf7OEJMXvCI8ELalx/:n/tQ+E+p6lisFWr/OEJMqIex/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
07e2b3e0e492326b3a0558f60da9b015_JaffaCakes118.doc windows office2003