Behavioral task
behavioral1
Sample
31f46d94239325a415cb106cc39e2cb4_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31f46d94239325a415cb106cc39e2cb4_JaffaCakes118.doc
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
31f46d94239325a415cb106cc39e2cb4_JaffaCakes118.doc
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
31f46d94239325a415cb106cc39e2cb4_JaffaCakes118.doc
Resource
win11-20240709-en
General
-
Target
31f46d94239325a415cb106cc39e2cb4_JaffaCakes118
-
Size
242KB
-
MD5
31f46d94239325a415cb106cc39e2cb4
-
SHA1
5b1b6baa4b9be250e47c56895205712a0cf9a706
-
SHA256
d074881ef32201cf5f607cf4977921f7cb591f3e51efa1896fe942bcb2b2501b
-
SHA512
aeca67983ba6ef7face80d88994aeb908c71586abe55a46bde9d8e550e8e5e9ecc9aaf944b095d7a370f1186aa62968b9b9a5349afba64eaa51c6598d001d67c
-
SSDEEP
3072:kvw9HXPJguq73/IKBWyiwdSLSKlm+cA6Wx:kvKHXPJi73wA5ULZk3Wx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
31f46d94239325a415cb106cc39e2cb4_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5