Behavioral task
behavioral1
Sample
2dc86ad726d8a218f62ba131db75cb14_JaffaCakes118.doc
Resource
win7-20240704-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2dc86ad726d8a218f62ba131db75cb14_JaffaCakes118.doc
Resource
win10v2004-20240704-en
5 signatures
150 seconds
General
-
Target
2dc86ad726d8a218f62ba131db75cb14_JaffaCakes118
-
Size
242KB
-
MD5
2dc86ad726d8a218f62ba131db75cb14
-
SHA1
b438f50dde3fcaa4e93f8f4f7f5a78c0a6fefd47
-
SHA256
8917a4217da3eb0cf8b33b1a0a85e221112f7ff79773b0b5f7e6c66c002fe1f5
-
SHA512
3fb5a73aa504c3bd8347a925990e49bf2034443419ab7c7b2d26da1a28e46bb44b8c65f8ef83a0af4fb9371112b21575afb193eeeac882082a4aa0f47da68098
-
SSDEEP
3072:lvw9HXPJguq73/IKBWygwdSHMhK4FDNTfTr:lvKHXPJi73wATUHIlxP
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2dc86ad726d8a218f62ba131db75cb14_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5