Behavioral task
behavioral1
Sample
15177fa5b815e4059fff32166fe63386_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15177fa5b815e4059fff32166fe63386_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
15177fa5b815e4059fff32166fe63386_JaffaCakes118
-
Size
68KB
-
MD5
15177fa5b815e4059fff32166fe63386
-
SHA1
e1084a36ddf3634c2b16c85dce478ffd4179c4b1
-
SHA256
0bcf279101223af1ee06be3f0afb66708690622102f6e99242e4c3dc315260b0
-
SHA512
7883d301946397f580e2a9905c3cd257e86696d4f66eb87f50a2c3dcb12fb53fefd14aa37c7e63830d8961921b64229aad3442aed1e078ab127a9fb17b06bc5c
-
SSDEEP
768:IWpJcaUitGAlmrJpmxlzC+w99NBM+1ofdMkwzmwy+Oc14zi9Vs/CHJe:jptJlmrJpmxlRw99NBM+afMmcIiTso
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
15177fa5b815e4059fff32166fe63386_JaffaCakes118.doc windows office2003
hPzsJuT
bZYRFpwMMU