Behavioral task
behavioral1
Sample
341b6d3b1909ed05ff05c67d0280651e_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
341b6d3b1909ed05ff05c67d0280651e_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
341b6d3b1909ed05ff05c67d0280651e_JaffaCakes118
-
Size
235KB
-
MD5
341b6d3b1909ed05ff05c67d0280651e
-
SHA1
562c69e86813d6bbc3bde9d6ba23928480cf0c90
-
SHA256
b315d36b633a51edbd5ac5f81b5eeff7b5e231e35c811a66f74db580be644d52
-
SHA512
fcee1c379be57634dab6776253e0f3b3570ec3e9d848ba7afdf884da0e11369ba599a7dcccdc864bbe816061cb339b15f3a1740070a8637e566f18a73452fde5
-
SSDEEP
1536:OterihwjEu5s1mermyzrKXhbgAHrTPMyBK/dRYD8AiyyrhsnB6ncRq71kN3NUV:O/wjd5s1mermyHKxngdSpiyyYCcRaNV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
341b6d3b1909ed05ff05c67d0280651e_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5