Behavioral task
behavioral1
Sample
319cbcc4bf45f93c3719554d3ce34404_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
319cbcc4bf45f93c3719554d3ce34404_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
319cbcc4bf45f93c3719554d3ce34404_JaffaCakes118
-
Size
205KB
-
MD5
319cbcc4bf45f93c3719554d3ce34404
-
SHA1
a136f004747576a78823ceea9829df8855242797
-
SHA256
b65f8d9d90610ffd209ca35705271a6902d9abbc08444b00e9c8824476f7adee
-
SHA512
1af6d89677adff648e03b3111102c4bcff55c49cc4407e977fc99de61a51b6de867ec6973fc812234422208a5481af812a351705deb9198754c6a187759b0faa
-
SSDEEP
1536:qtPrT8wrLT0NeXxz1DweaHrTPHyJ5J8b3rmks0Hi59igAcV2mjC:q2w3keXxz1DfyQkre0C59pAcwmG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
319cbcc4bf45f93c3719554d3ce34404_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6