Behavioral task
behavioral1
Sample
bd815c4034216d3b3076281ff4919113_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd815c4034216d3b3076281ff4919113_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
bd815c4034216d3b3076281ff4919113_JaffaCakes118
-
Size
90KB
-
MD5
bd815c4034216d3b3076281ff4919113
-
SHA1
c023224f66578b6a5982a2826050cee372980dec
-
SHA256
3d096bff491a9bc361385024d61cc578f9ea0295cf2403642f036d253ecc87b7
-
SHA512
420959c256922bf2f55dca6ccda2100914ee6dc7ee639c113ebe49c996710e79a0c43a04fdc27e6925467e43684f0b3e02f3674453dcc9d4a2fd20083022823a
-
SSDEEP
768:h////gpJcaUitGAlmrJpmxlzC+w99NBx+1oU7et8SEzNqP6g9N5gMa+rEopSSI6y:SptJlmrJpmxlRw99NBx+aU7eIK6YafU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bd815c4034216d3b3076281ff4919113_JaffaCakes118.doc windows office2003
ZQcjfdlPiQGGEW
jJPwzAXun