Behavioral task
behavioral1
Sample
074862069ae30b2fea7e967368fe26df_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
074862069ae30b2fea7e967368fe26df_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
074862069ae30b2fea7e967368fe26df_JaffaCakes118
-
Size
242KB
-
MD5
074862069ae30b2fea7e967368fe26df
-
SHA1
e42b639990bd07890aa8c43e10e5057e93877f8f
-
SHA256
b0b84c7b7e476bde61903d38cb753b162848fd83c893e56a7b5cf2128755cff8
-
SHA512
1f55eb77f2d1d0a925f5ee92328f28bc2a8b672e83af692fb5d860dd13c4d950f33f0285852228bcff9da9f53cbbcc0825c380a15382bec86498adbe48e79ea8
-
SSDEEP
1536:RterTkw9HnXPJguq73/IKB5Kby0gvFHrTPnyGK/dRY6ufbp95xeFQ2UMv5U7Vmb:Rvw9HXPJguq73/IKBWyj2dS9fblx0nvH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
074862069ae30b2fea7e967368fe26df_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5