Behavioral task
behavioral1
Sample
0e296dcece26f5e18331f387168269ff_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e296dcece26f5e18331f387168269ff_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
0e296dcece26f5e18331f387168269ff_JaffaCakes118
-
Size
205KB
-
MD5
0e296dcece26f5e18331f387168269ff
-
SHA1
beeb4ace5c6c119d6c98b8952a39f367ceb6d424
-
SHA256
1c62c4a7b08e83202682f923fa4072087851182562dd49d0239661a32e12f1b0
-
SHA512
1afcd1dc811da9a714b794fabbab7457ab2aedea62961e91f422a791f1a3b82c0eb08153bf500134011ea786cdacdf44f7847eb621b7b5416a90ac6770f13818
-
SSDEEP
1536:ytPrT8wrLT0NeXxz1DwepHrTP3yZ5J8bUd0n8cnn0UgE9nFC1s89Kpa:y2w3keXxz1DfpUvrVEFC1s89KI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0e296dcece26f5e18331f387168269ff_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6