Behavioral task
behavioral1
Sample
4c7848798355ad2f2ded1a681e1e37bd_JaffaCakes118.doc
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c7848798355ad2f2ded1a681e1e37bd_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
4c7848798355ad2f2ded1a681e1e37bd_JaffaCakes118
-
Size
239KB
-
MD5
4c7848798355ad2f2ded1a681e1e37bd
-
SHA1
4275c8b308e43a12dc248378b116c5b009edf02d
-
SHA256
9fa1d524efda69dc177c56b4fedaa2049f432b14b33acbb0be30f9cbcd321a08
-
SHA512
47dd8f363803043287eb36347e9201bc4185169f28190d719a6122c53f5f7525cbaccbaf5feb75443159a21ebb320dff9ea57603b34f6786e26871aa922f9582
-
SSDEEP
3072:a/wDvWETOgnHJcIKBs7xydSDvoJCcJwuu37:a/avWETrHJ9ApUDvFcun7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4c7848798355ad2f2ded1a681e1e37bd_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5