Behavioral task
behavioral1
Sample
18baae4aebb9fcc99f6fd614b587e7ff_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18baae4aebb9fcc99f6fd614b587e7ff_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
18baae4aebb9fcc99f6fd614b587e7ff_JaffaCakes118
-
Size
204KB
-
MD5
18baae4aebb9fcc99f6fd614b587e7ff
-
SHA1
6cffa4bb7f72ae8e6f0e1bfc62418f0d2579fe81
-
SHA256
adc94851d707cd26e70ac05e418599327beaa1ef54a2d6e160acb752a017eb28
-
SHA512
4691ec52a672c666c90d5029a96a1b91d9a3ccedeebf5ca7188ebfd3847cb3f98b4c5e6b9ab18eed60f94b96b3df332bc7341214deeeedd8c8c68e843fb6f983
-
SSDEEP
1536:BxtPrT8wrLT0NeXxz1DweXHrTPkym5J8bSqjRVBG/Edsmvh6j7Kxd:r2w3keXxz1Df767WrgKj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
18baae4aebb9fcc99f6fd614b587e7ff_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6