Behavioral task
behavioral1
Sample
0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc
Resource
win7-20240611-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc
Resource
win10v2004-20240611-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118
-
Size
238KB
-
MD5
0ec921776ae38f6584f6a354e3c6651e
-
SHA1
9750a3fcc7186769bba755d5ceeecad09c8df4e4
-
SHA256
456fb7d1f6c71ed4f2e4de9b8788fa104f70caa9c6b6e7c69867e671d736a2ea
-
SHA512
56227db73736f118b957f9e1ca068f8a9389d11009312d7cb27a412c5321c9dfbfb34f5b76dd5bb92cf36ac33b7fb429ca47f23dded0cde1fc008ee7a93ac516
-
SSDEEP
3072:a/wDvWETOgnHJcIKBs7GwdS31DMnkpWoYX9:a/avWETrHJ9AqU31YkQoYt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5