Behavioral task
behavioral1
Sample
2b645653216cf143f6b73626e2bbbe31_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b645653216cf143f6b73626e2bbbe31_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
2b645653216cf143f6b73626e2bbbe31_JaffaCakes118
-
Size
63KB
-
MD5
2b645653216cf143f6b73626e2bbbe31
-
SHA1
a55d1c6d61e59ece7e7d0e0594075c56702b9f86
-
SHA256
d00be1070b0155e66502d33ebdf4c7d1f9d3faac983848a40cf96f8c63d50a78
-
SHA512
45c367bb036f1ff158c3e399083e7e8c804acfdad1191f03495976829c1a3aadd8cd8a3a1fff629c69121e34e27398e628b7cf733190d28c23b4fdf3123ffc61
-
SSDEEP
768:4pJcaUitGAlmrJpmxlzC+w99NBN+1oWiI1piW1Efo44/+7szlDsB8H:4ptJlmrJpmxlRw99NBN+aW/17mAa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2b645653216cf143f6b73626e2bbbe31_JaffaCakes118.doc windows office2003
hmPtPanBTZfrmR
shsnphEOZJDktX