Behavioral task
behavioral1
Sample
15e3411beec23264304da63d9fdb705a_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15e3411beec23264304da63d9fdb705a_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
15e3411beec23264304da63d9fdb705a_JaffaCakes118
-
Size
10KB
-
MD5
15e3411beec23264304da63d9fdb705a
-
SHA1
6471725f0435e5647ae3ad99f0a41287264c57d7
-
SHA256
bddfccb52538a95a8346047493d91820a2bec5d71bb1754e9c79f1a4d0b16963
-
SHA512
12b950424e8aec22df089f8c76a8103dceec791b2d081c5d03a0d433f694c3c636c3c1f01dad87c0e7aa52cbe51cced12885d21e781767a134329f4fd17d7c63
-
SSDEEP
96:RKt0pWQfWXuQACaFcFftAI1vc+30jL6bgHGetO5uIn34YevbXdkGMpCkJEO2aX03:R3BQxQcxtzX0jCgmetcn3uTQsa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
15e3411beec23264304da63d9fdb705a_JaffaCakes118.doc windows office2003