Behavioral task
behavioral1
Sample
af14ba1dccf63f145133d341bc677c35_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
af14ba1dccf63f145133d341bc677c35_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
af14ba1dccf63f145133d341bc677c35_JaffaCakes118
-
Size
121KB
-
MD5
af14ba1dccf63f145133d341bc677c35
-
SHA1
a3b96ba848733475cd6b87b01c743b2e8ed621b6
-
SHA256
f9b4476f68044c18144fca49c9851f837b39584cc47acc65deaac65d67f7e8ff
-
SHA512
d2cee38c66deb5e4974c027dd323ac340f7d3770275bfe0f22f5b52364a9eb1f18f09bb3ce99a6fa383e0b5668321aecb4d74b1bf2328b9402c1d1b0114a042c
-
SSDEEP
1536:mptJlmrJpmxlRw99NBq+a9fctk0bARn03mhE7M7L1HbCmnrlL8gfvQ:Kte2dw99ficTS03r7UL1HempL8gw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
af14ba1dccf63f145133d341bc677c35_JaffaCakes118.doc windows office2003
XjfLisDjucS
XpzIKKTGQiwv
psiKPThAkow