Behavioral task
behavioral1
Sample
378fab937046aefb8156b9690387c56e_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
378fab937046aefb8156b9690387c56e_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
378fab937046aefb8156b9690387c56e_JaffaCakes118
-
Size
205KB
-
MD5
378fab937046aefb8156b9690387c56e
-
SHA1
9012b53f87c8ea0149beaad7948140b1340d64d4
-
SHA256
c664fe2de05c0db6b343e3300d7e5bde12b1f6ba79832801d3a237a1d87d5fe0
-
SHA512
79fc689d2ac93ba4ae658979304a1f66413986b6066a7b2a97d1abf24ba469c0e2996b7066bb597a248f3694fa52896f57dc84bf8de1e6cbdc1efa808cd3f8b1
-
SSDEEP
1536:YtPrT8wrLT0NeXxz1Dwe7HrTPayY5J8bhIYB/2tAocQqK0yPPZ3d:Y2w3keXxz1DfviAIYBetAkLh7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
378fab937046aefb8156b9690387c56e_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6