Behavioral task
behavioral1
Sample
145c28eaeac325e845b66a82c2220f2d_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
145c28eaeac325e845b66a82c2220f2d_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
145c28eaeac325e845b66a82c2220f2d_JaffaCakes118
-
Size
292KB
-
MD5
145c28eaeac325e845b66a82c2220f2d
-
SHA1
dbe78d912a79433d5cc619fce31c14b4f014667e
-
SHA256
9e5504ef68a5d98d68ad98f656bebe7eb115aa04b36a73207a8a3ba9cb44514c
-
SHA512
f878b9e615e26f9ce94814f8e2cf41a29024b020a19c542f6575223c4a02dcdb0383e0e52b03284a45d64894b885bc65b20cd0b269ef873e17082d414ab6e18e
-
SSDEEP
6144:1l20PikYuZ1XU1xD1Xm+BUY+VllauD/qw+uc+y/dK1S4BspWQF3bKsP:1l16u78hXm+BUY8lPDHcl3Ks
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
145c28eaeac325e845b66a82c2220f2d_JaffaCakes118.doc windows office2003