Behavioral task
behavioral1
Sample
3091c49d5f450560a4c73479be66ebc4_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3091c49d5f450560a4c73479be66ebc4_JaffaCakes118.doc
Resource
win10v2004-20240708-en
General
-
Target
3091c49d5f450560a4c73479be66ebc4_JaffaCakes118
-
Size
243KB
-
MD5
3091c49d5f450560a4c73479be66ebc4
-
SHA1
3790d83d781a0f98059cf2b87161734258e6b42e
-
SHA256
4941c6b595444f5102190adc280be1afe3af37356f3fa92d4d0f5776630bf050
-
SHA512
941d8a9a5181ed92b2c0bc823387b675ea2c8c04384657f89109126351ea7622168a9de2690d64d146bba07e5112160eee9cbfcabad470b7cb85ea7642108884
-
SSDEEP
1536:7terikw0HJzwlIiuq73/IKBPdbs0gJQHrTPiy7K/dRYLxQrf0aXrgRq39ZvpGSQY:7Ow0pklIiuq73/IKBdsYEdSmNXr5tZl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3091c49d5f450560a4c73479be66ebc4_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5