Behavioral task
behavioral1
Sample
17ea41af6c2095763c515907d9891157_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17ea41af6c2095763c515907d9891157_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
17ea41af6c2095763c515907d9891157_JaffaCakes118
-
Size
227KB
-
MD5
17ea41af6c2095763c515907d9891157
-
SHA1
2b03342c61480686b0c1ff1887eceba81d6e40ca
-
SHA256
ff4ddf4aa1f9b0e93830e1ff93a1a8ad3a5bccd9adc33730d1d5eda3a5b604b0
-
SHA512
d8ab85f4b438f5d1424f365c60698bad2f63791f94db28f5093d6d1d789d843a8106088c74da6f8d0ce84abeacac8229df14ee1370536a9db82012900b640184
-
SSDEEP
3072:3dgaE5eDjYzqeUDfTRMIOrD3WQQgl8aZQZKcprATkhdr70DJkGH7UjxixWY:3d9DjSqewFMIOXZR8aurtC6WBYwg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
17ea41af6c2095763c515907d9891157_JaffaCakes118.doc windows office2003
ThisDocument
hkbaQLDn
DLppiRbZqfzIP
GaAFwmbT
SJsvCLnNXDAF