Behavioral task
behavioral1
Sample
301c27a7d995b364e002eb0b7a3daad0_JaffaCakes118.doc
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
301c27a7d995b364e002eb0b7a3daad0_JaffaCakes118.doc
Resource
win10v2004-20240704-en
5 signatures
150 seconds
General
-
Target
301c27a7d995b364e002eb0b7a3daad0_JaffaCakes118
-
Size
235KB
-
MD5
301c27a7d995b364e002eb0b7a3daad0
-
SHA1
0cdbd64326e7b1e428cace2fcc9226ab40dd2338
-
SHA256
bfefd46356decf1a1c653654244f43480267740f991eb9af4ab3116747f5fbfa
-
SHA512
39d4e884153ea7292b6b5031457e0779b6a4058759b3fd4a580e7e4f6f0197d3bd5770aa6762233eec8b52c5ae6e3f8561eed635e4ebac336b19b32a1865ae53
-
SSDEEP
3072:n/wjd5s1mermyHKxMsdS5sl8OgLy9NNkQL:n/md5sNrmMkU6lcyNkQ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
301c27a7d995b364e002eb0b7a3daad0_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5