Behavioral task
behavioral1
Sample
254843673e2d5880e01495337abad5c1_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
254843673e2d5880e01495337abad5c1_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
254843673e2d5880e01495337abad5c1_JaffaCakes118
-
Size
117KB
-
MD5
254843673e2d5880e01495337abad5c1
-
SHA1
85a272f4fd6cbaecd1de9345d377907fe4f1e308
-
SHA256
aace6aafe5df6c9ca07da59c26ce632243f2c2e3a6923aae4a49b7640d198a4b
-
SHA512
8139a7dedd0be77680aac4bb9210e4817888190ee04290969cfdfc8295ca26e9f21a5559b5b8280a800d879e31c02ecb8f9b5dee8ca84dce4e6722ec31bd670e
-
SSDEEP
1536:jXqfuyA02EVBYVnff9taLeFVLRyll9F6fn+d+0n0B8ekwo87uJt4:j6WA2EVGJf9MLULEjgn+dB06B8iz4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
254843673e2d5880e01495337abad5c1_JaffaCakes118.doc .ps1 windows office2003 polyglot