Behavioral task
behavioral1
Sample
0d49705141346c28defb1b5df189e324_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0d49705141346c28defb1b5df189e324_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0d49705141346c28defb1b5df189e324_JaffaCakes118
-
Size
154KB
-
MD5
0d49705141346c28defb1b5df189e324
-
SHA1
60fa17b2f42dc3ff1ae5b70a59d27061594fde49
-
SHA256
7547e5a842fa76a8e774c261cec1f6776c1460c1aade602a56b43f92c70f6cb4
-
SHA512
0f9cb18f72abf2e557b6f5b20ce3f4e2d08f835cf7e917b448520540c141419e3f825fe57774653bcb7dd7886d581c014cc15ccae32f58a3dd8448dbe95658f0
-
SSDEEP
1536:7INVczHkD9icmT+FFdZ+a9Xhnd+vK5dbVCpdKEEFe3wpeKxX/85AFcndRJ/p:7In/iKFZhd+Ytxxv85AFcd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0d49705141346c28defb1b5df189e324_JaffaCakes118.doc windows office2003
PhoNjoqrQYVI
PkAiIXtTisuJw
lfFvSqAqD
wqOZiQdj
zPGlknw