Behavioral task
behavioral1
Sample
0bf28d1d55a44d5e6b1223b897e9ddd6_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0bf28d1d55a44d5e6b1223b897e9ddd6_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
0bf28d1d55a44d5e6b1223b897e9ddd6_JaffaCakes118
-
Size
239KB
-
MD5
0bf28d1d55a44d5e6b1223b897e9ddd6
-
SHA1
857cf1b0e452af829c92f21446ea409aa855e62b
-
SHA256
ac150dd8f4e4bc0b85bac1a40b20c1aa1441f477884b5d66ae3b56cdc5e7868e
-
SHA512
3eae3fb8902bfffefae821d91884da5327846d5b767d38a53682315f2ee14e60db00546854e367da72fae0623db7256857e69d8921c20821683b3b932ec35699
-
SSDEEP
1536:IterU1wDv/6MaETOgnHJcIKBC5bvzg1HrTP3ymK/dRYmISfjzxbiFq+gGE5YV1NA:I/wDvWETOgnHJcIKBs76adSmqh1C
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0bf28d1d55a44d5e6b1223b897e9ddd6_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5