Behavioral task
behavioral1
Sample
085e8ca7b1d014cf878c4740750e5438_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
085e8ca7b1d014cf878c4740750e5438_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
085e8ca7b1d014cf878c4740750e5438_JaffaCakes118
-
Size
234KB
-
MD5
085e8ca7b1d014cf878c4740750e5438
-
SHA1
8323d8a038208a3896195f03897036a4b5be6c3d
-
SHA256
f34cf205a3c064125ff6a3431b15684d2faec388224c8d4fd5417a1b853d574b
-
SHA512
8160e31966d6a4f60980bd13f0dc8523ff711d0291b07e84c1f9fa84770f2a2817c819f6a036635b54ef9c150dd1510af2eab042419c26f1805663b3155e7ebd
-
SSDEEP
1536:LterThwxEM5OsmqrmrAK9hb8VHrTPTy6K/dRY8xT/3cE/ykVQ+ikH4EHxZOp:LUwxv5OsmqrmrAKHGqdS8xT/3WbMxZe
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
085e8ca7b1d014cf878c4740750e5438_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5