Behavioral task
behavioral1
Sample
3ae30f82ae8c25f26f94e3ef93d1ab3d_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ae30f82ae8c25f26f94e3ef93d1ab3d_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
3ae30f82ae8c25f26f94e3ef93d1ab3d_JaffaCakes118
-
Size
205KB
-
MD5
3ae30f82ae8c25f26f94e3ef93d1ab3d
-
SHA1
2e8de115d9655b329bac3cea708ec7b0130e78fd
-
SHA256
bd8c4ac429fb14a804d378a5996fde36205b309fa79f10484f35fea8c2a99731
-
SHA512
8bd15f561fab1c249459c3075c91d27f79f36b57713c8172c0f846b71dab375ed09278066792df898c4a1a8901ff9158d50f3b3061e5aa2f547469c1e58bd9d7
-
SSDEEP
1536:LtPrT8wrLT0NeXxz1DweMHrTPey05J8bGTo2/5jvXesyaKn+1I6tH2vAWm:L2w3keXxz1DfoW5To2/ga+PWcm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3ae30f82ae8c25f26f94e3ef93d1ab3d_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6