Behavioral task
behavioral1
Sample
3492414ac7f96cf096455293a419bebc_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3492414ac7f96cf096455293a419bebc_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
3492414ac7f96cf096455293a419bebc_JaffaCakes118
-
Size
204KB
-
MD5
3492414ac7f96cf096455293a419bebc
-
SHA1
a9e1541403f94ed1170ebb26e74b615367a94c94
-
SHA256
6f9f0bfa2dec9a1b1178b4ca50966833f7515b12fdee5d015977f96558fe2b4c
-
SHA512
27945244c34e7fbaced1d5ea23ff47b53f9853d6de843a7bf4a93c3bee62ce4873c3570c6793d15882fc57e8ff85d3cd69f94e6275e1b47256a22fbd82192aa3
-
SSDEEP
1536:ptPrT8wrLT0NeXxz1DweIHrTPQyq5J8bCXmhKGJtbJKjPNFTwe5J/:p2w3keXxz1Dfk69XXeJ8ie7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3492414ac7f96cf096455293a419bebc_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6