Behavioral task
behavioral1
Sample
477b3718878eb8ac2b8a2068cecbda89_JaffaCakes118.doc
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
477b3718878eb8ac2b8a2068cecbda89_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
477b3718878eb8ac2b8a2068cecbda89_JaffaCakes118
-
Size
235KB
-
MD5
477b3718878eb8ac2b8a2068cecbda89
-
SHA1
6180eff3c2c4a652a6248962e6f5504648c10d7b
-
SHA256
3494df37d39a584575323897955dbbd87ae80ac393539f5580547286d770c9d0
-
SHA512
2f92c0f2b84a5da7d9ec9cb6eaca2c1df4c51e3c65f49009165fff89166a6b5d21be84c8a32c74284ce92a5391477dd412701af548db27bf75a723823e73f4d9
-
SSDEEP
3072:J/wjd5s1mermyHKxTmdSwmqCyxfptLhNcAGqD:J/md5sNrmMHUwmqFXJhNn
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
477b3718878eb8ac2b8a2068cecbda89_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5