Behavioral task
behavioral1
Sample
0805fa4e9b4ab35c675fa0089811e8b8_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0805fa4e9b4ab35c675fa0089811e8b8_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
0805fa4e9b4ab35c675fa0089811e8b8_JaffaCakes118
-
Size
242KB
-
MD5
0805fa4e9b4ab35c675fa0089811e8b8
-
SHA1
b247a31f796f59daef5cf15410d2da1f5be2154c
-
SHA256
f438da0dc1acd53f14a4d91f7eb25d760b0cd6738baf2264b9d8ac0856c10e94
-
SHA512
84c22a28dcf9e97cc88f3fce9c992d33ee972dec164e705574a924d91ec8a195eaca2e4e824ed06d81016e795e33d098cb40b4a3b569c3063eaa9e95ef29a042
-
SSDEEP
3072:vX0vw9HXPJguq73/IKBWyKJO2IdSsoa1kM6rwcKEqO+GmSen1nu:vX0vKHXPJi73wA8E2IUsoMYKEq8K1nu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0805fa4e9b4ab35c675fa0089811e8b8_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5