Behavioral task
behavioral1
Sample
32357645af8a28a6f0aef5fca4552696_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32357645af8a28a6f0aef5fca4552696_JaffaCakes118.doc
Resource
win10v2004-20240704-en
General
-
Target
32357645af8a28a6f0aef5fca4552696_JaffaCakes118
-
Size
205KB
-
MD5
32357645af8a28a6f0aef5fca4552696
-
SHA1
f565550a322afd85f89576fefefd17ab96d6de2e
-
SHA256
a1ca3566879eb42b56db6494104eb8604d49fd0414ecdf5c494b7e7efebf4b84
-
SHA512
0fd1f6620cc1ff1382d34090808ddf217525f351c5f2062535aeb0019a36115ef090fe592c310948fd9e6bfc8c7f1274f1282a2509c1a88a4fc5a568cefeee49
-
SSDEEP
1536:EterT8wKLcCmXwGe1G0pDHrTPAya5J8bviq7KBUaiTyRmLeMsCjJW0pAtXJ:ERwycXwGe1GMXyGeUByRmLeXCjJWaAt5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
32357645af8a28a6f0aef5fca4552696_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6