Behavioral task
behavioral1
Sample
283ab094f763198fd1bce3667c5aed6c_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
283ab094f763198fd1bce3667c5aed6c_JaffaCakes118.doc
Resource
win10v2004-20240704-en
General
-
Target
283ab094f763198fd1bce3667c5aed6c_JaffaCakes118
-
Size
204KB
-
MD5
283ab094f763198fd1bce3667c5aed6c
-
SHA1
d2d56d9501777a067a5daaeda4fb0486be3d600f
-
SHA256
63af99d41d236e33632c374b6a5dd3bf357bafc432c7d9da0d79de93f008d7e5
-
SHA512
85beaaa75f2df997472ef29d845787bde8e25c6b0d9ba3a63fbb48948bcd16870e24da167e9e2ae7935de37a8d26f9d2a8c8ed8793d094e59f015eafceb2c4c4
-
SSDEEP
1536:PtPrTFwx/+/LypKdsDV7MHrTPdyj5J8bXBPP7S/5iRttughm65K356cVzYKX6XbM:P7wxGD8usFoUgpGhIwv65U0azYKCbM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
283ab094f763198fd1bce3667c5aed6c_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6