Behavioral task
behavioral1
Sample
32c44fc9c210a7b5c6d736ccfc9ed0a3_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32c44fc9c210a7b5c6d736ccfc9ed0a3_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
32c44fc9c210a7b5c6d736ccfc9ed0a3_JaffaCakes118
-
Size
205KB
-
MD5
32c44fc9c210a7b5c6d736ccfc9ed0a3
-
SHA1
3f3210d2e05a2158ae6ce95aefafc06efa316f3b
-
SHA256
cd3bab76db7dc93ada04229ec23fa959982e360cff3a6a640217c00daf878b7e
-
SHA512
46e6d0108d81a33f276a28dbec6eec7a589f9fb2c31f4f91ef52dd642a77a1a4d182b7ce5719c79c282b6b5b3449ebe6235f9e0f4ba96b4d40d2a1bc99711d36
-
SSDEEP
1536:6tPrT8wrLT0NeXxz1Dwe7HrTPoyS5J8bNaEAaH9Y9zpF6d4T5BQtj:62w3keXxz1DfvC29BYJ6GT5Aj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
32c44fc9c210a7b5c6d736ccfc9ed0a3_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6