Behavioral task
behavioral1
Sample
b527d18d6778bb1e0b14066093459757_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b527d18d6778bb1e0b14066093459757_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
b527d18d6778bb1e0b14066093459757_JaffaCakes118
-
Size
83KB
-
MD5
b527d18d6778bb1e0b14066093459757
-
SHA1
ac370517756148570a0d3e739d96b5f817178f57
-
SHA256
7dcb5164a9817853aea9c1215ff9f9930ebf69a81172cef07b3842b4840ee835
-
SHA512
71f5d90a9faf8d254c9464c53d9bd1488d7d5843d7750ac5e0c2f9ca6b943df098f0ce82248cc05a067955b8450ffca4e556780b9b0e22fd8aebdb679e4d64a9
-
SSDEEP
768:fpJcaUitGAlmmmxlzC+w99NBgoBVQjF1uOo6a85uXBY99ORe0kZhOM/qezy:fptJlmmmxlRw99NBxBS1dfaJKI+j
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b527d18d6778bb1e0b14066093459757_JaffaCakes118.doc windows office2003
YXKjrzjwwzDo
NUADRhErKABjQ
WMWslEJoNi