Behavioral task
behavioral1
Sample
3b648d992ba3729fcf5af6c91e95ca35_JaffaCakes118.doc
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b648d992ba3729fcf5af6c91e95ca35_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
3b648d992ba3729fcf5af6c91e95ca35_JaffaCakes118
-
Size
235KB
-
MD5
3b648d992ba3729fcf5af6c91e95ca35
-
SHA1
0e9b0c752d65eeccb1cff812e2ba5bd4ee7f2723
-
SHA256
f0f658ff6fcf19d751d79c4185e26885730d14ab00e45086bd815ab7ebf54f3c
-
SHA512
3bc17bf41743289ec6455572965269149270a51ab623ee128b1cf1f82d3511c7a967b7a02f060ad8380e619b9b986e59aa3a04640b7669e46c3ad9ed25cabd72
-
SSDEEP
3072:e/wjd5s1mermyHKxVwdSxvoaJuRjl2KLi:e/md5sNrmMfU1FJmlFu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3b648d992ba3729fcf5af6c91e95ca35_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5