Behavioral task
behavioral1
Sample
19269c9a7d06b20624644c21a7b624db_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19269c9a7d06b20624644c21a7b624db_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
19269c9a7d06b20624644c21a7b624db_JaffaCakes118
-
Size
241KB
-
MD5
19269c9a7d06b20624644c21a7b624db
-
SHA1
e97f75c0cde260790eff2158d649558e732fc0e0
-
SHA256
77f7554f334160993b0a0fc7e6459c195836b648c3b6b25655d580a105b156ea
-
SHA512
60bf92c4d7a76f4475aea5e3dd5fb1170a92573b23ce85b4bd7431bdff38ef3fd9dbb96a8253500a1718a7072b5ddbd66fa95eb8a5080cb961d5c2974a057e7d
-
SSDEEP
1536:cterTkw9HnXPJguq73/IKB5Kby0grOHrTPWy3K/dRY5Qn2B2oy24VhPnPDi:cvw9HXPJguq73/IKBWykcdSSg3bQPm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
19269c9a7d06b20624644c21a7b624db_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5