Behavioral task
behavioral1
Sample
17a107108c8839f21e13452ce409d322_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17a107108c8839f21e13452ce409d322_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
17a107108c8839f21e13452ce409d322_JaffaCakes118
-
Size
76KB
-
MD5
17a107108c8839f21e13452ce409d322
-
SHA1
dab36797012cd0125a8b596baa60cd80c940ee13
-
SHA256
cf258ca23739eeaebeead436ae59313062f65d6be0728652c9d11bc5cd403de1
-
SHA512
18b59a0f56586314c02c48ef790e42f38bbc31c8ed21dc0339e18a2d0b46e0e87060abcb98263ee7df4e35abc9ffe47357818ddc4082873a3fdcd24cffee249d
-
SSDEEP
768:G6pCvTvD01Q/7YVYj1en4Ti8ROc43Fwd3y1EN3o/JRJ8iLyIMl:VAvw1g7YVYjK4Ti84ZOVy1EpoBL8mw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
17a107108c8839f21e13452ce409d322_JaffaCakes118.doc windows office2003
ThisDocument