Behavioral task
behavioral1
Sample
3efb9c579d611349e0faf9d8ded589ed_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3efb9c579d611349e0faf9d8ded589ed_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
3efb9c579d611349e0faf9d8ded589ed_JaffaCakes118
-
Size
236KB
-
MD5
3efb9c579d611349e0faf9d8ded589ed
-
SHA1
ae0c24033010f0c9a582bad453887b3af2f3a3e5
-
SHA256
6f90687f3c229e900996da43ddafda022d84e6ed61276602d2335c19f822fc17
-
SHA512
4c3f51dab84fff24bdad63e601e585ec59ca3d919f89c0c3c01faf8fb0b0e66b9e31748313067ea81a002b67cae7b32dd3b601a1d54f5e6a70dff81435178e9e
-
SSDEEP
1536:wterihwjEu5s1mermyzrKXhbj3HrTPJy0K/dRY6zLCsoafmgzpiZjD/JppA:w/wjd5s1mermyHKx/idSFaegNiZjDG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3efb9c579d611349e0faf9d8ded589ed_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5