Behavioral task
behavioral1
Sample
3dae3cf08da34afc4661e5125ce4e3c0_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3dae3cf08da34afc4661e5125ce4e3c0_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
3dae3cf08da34afc4661e5125ce4e3c0_JaffaCakes118
-
Size
241KB
-
MD5
3dae3cf08da34afc4661e5125ce4e3c0
-
SHA1
57c918272245ace5dc72380e3646c00e715846dd
-
SHA256
eba653da1a27cac9fe048891ea2e4ddb575b79d373312f5aedacbde15af4d566
-
SHA512
e5be336dfc0dce7fc2594d202bba80b6b238c945c37a23cc9191791068bbe9e720b42dceaabeda2983d00d4b881c1bfa21012fbde2cce7755f1ac02f4c7e193c
-
SSDEEP
1536:rterTkw9HnXPJguq73/IKB5Kby0gWOHrTP+yvK/dRYQErKm62S+NXcko91h74kc+:rvw9HXPJguq73/IKBWyrEdSVdHXsl3L
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3dae3cf08da34afc4661e5125ce4e3c0_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5