Behavioral task
behavioral1
Sample
48ae1ebd2bf13b595f16a144c53eb625_JaffaCakes118.doc
Resource
win7-20240705-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
48ae1ebd2bf13b595f16a144c53eb625_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
48ae1ebd2bf13b595f16a144c53eb625_JaffaCakes118
-
Size
242KB
-
MD5
48ae1ebd2bf13b595f16a144c53eb625
-
SHA1
3f989f9b16424972100f1836d64632c97763affb
-
SHA256
25738ae0f45bf14d87b4af749f3750be2e60adb74ee450e6c54183e5ef508b8c
-
SHA512
d4f327941fc221a2ed1adbf62c5dc416d4c6c2b1d3f88957d5066d2301cbc2a07953e736097ae0638639d14d50d98872aee0e1b825a799250131a8a1fb965d56
-
SSDEEP
3072:FOw0pklIiuq73/IKBdsIIdSmVvW3rwWHDneXUwEF:FO5pklIo73wA8UmlWbweDYHEF
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
48ae1ebd2bf13b595f16a144c53eb625_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5