Behavioral task
behavioral1
Sample
b0f700002baa4d6c0473f39281fac5da_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b0f700002baa4d6c0473f39281fac5da_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
b0f700002baa4d6c0473f39281fac5da_JaffaCakes118
-
Size
34KB
-
MD5
b0f700002baa4d6c0473f39281fac5da
-
SHA1
7884a2e6790e0691ec033a22641cf7548406f667
-
SHA256
b402a789b67d7d06674b0f4f5d40832c5f0cbc02e1339141c4c20f40cc0313e1
-
SHA512
4074d06c15e1e34b7dcb57c691ed89733a9529fcbf980e8b798195ed92563dd50be3a71d18cde68981f9651f984d76064aa5fce63159c425580b0d81ff79205d
-
SSDEEP
384:DNPM2G/ST7H2JRYVz13ozNLfplsOJIGlnvCGNIh1q4lF7Ks+T6veI60jbQ55tX/x:DlM2WST7HiqJ3QNLz7lnvy1xbK9J51
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b0f700002baa4d6c0473f39281fac5da_JaffaCakes118.doc windows office2003