Behavioral task
behavioral1
Sample
0f7de08cdaf2a43a3e33ea894fde0d0e_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f7de08cdaf2a43a3e33ea894fde0d0e_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
0f7de08cdaf2a43a3e33ea894fde0d0e_JaffaCakes118
-
Size
242KB
-
MD5
0f7de08cdaf2a43a3e33ea894fde0d0e
-
SHA1
409ff6f366665092bd5d28cb781ccd93b11cb81f
-
SHA256
7f632cce53dc769d8a4b896b24d670387354c04a58a0796c9808e234bb872d95
-
SHA512
5a2cca9bc7669c1c74b2c070d872888ee1dbe8a4137dd422e79321e83c21d32d905165219880713eaac442665d50d031c49061e60edd69b57806089990c5d81e
-
SSDEEP
1536:HterTkw9HnXPJguq73/IKB5Kby0gqxHrTPLyCK/dRY3RmsnJ8GuoaxyZoHe:Hvw9HXPJguq73/IKBWyYCdSBHJ7ax2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0f7de08cdaf2a43a3e33ea894fde0d0e_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5