Behavioral task
behavioral1
Sample
7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118
-
Size
125KB
-
MD5
7269c689963f7c860ec3fba9bfad48b6
-
SHA1
7536c7f2041105985a4b9c9541a8c96779a35fa8
-
SHA256
b770af4b04ceb9dce64f081c25a3297389b19a5ed757e020c06f9427ef76c03f
-
SHA512
656f0ef5000d1cb4137cca0f330bbe85ddce4253fc552695b5bc6644a2914bdc424ae6ba974bf993089959e78ac745dad4eba62d382bf746097054ab2a04cdc2
-
SSDEEP
1536:7ptJlmrJpmxlRw99NBD+aEcV2ABDrtGcONzhSTSriGcNdrBgZI916TJaQ91:Vte2dw99f996AxGcdgE16r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc windows office2003
BIGvBwSwFq
GFzhMzYDth
EnPIwkwa