Behavioral task
behavioral1
Sample
1639529b874fd4542fe764723a409756_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1639529b874fd4542fe764723a409756_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
1639529b874fd4542fe764723a409756_JaffaCakes118
-
Size
242KB
-
MD5
1639529b874fd4542fe764723a409756
-
SHA1
e9b5c172ebe286d1c9f86f728491b789dd0198da
-
SHA256
3598a4e8f79938a5e94f6c7274d60d0f4670dc73856243ffd915c56094db2126
-
SHA512
ac574977a296574501e09ad4ce1821e698667b2fa3f088de5313f6edd74d966cfef5f4e9ec60698c0d6d5b18d745be5a893490eba3bfc0cb3df69fc9a0e6c4b9
-
SSDEEP
1536:9terTkw9HnXPJguq73/IKB5Kby0gchHrTPryiK/dRYpmXWDapCi9iy:9vw9HXPJguq73/IKBWy6ydS0GDk5N
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1639529b874fd4542fe764723a409756_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5