Behavioral task
behavioral1
Sample
4c841ae9c967982e12480080fa042b1d_JaffaCakes118.doc
Resource
win7-20240704-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c841ae9c967982e12480080fa042b1d_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
4c841ae9c967982e12480080fa042b1d_JaffaCakes118
-
Size
243KB
-
MD5
4c841ae9c967982e12480080fa042b1d
-
SHA1
8efcf135b69c0d33bae221f71c3b6a9492bfb6c8
-
SHA256
78246d6e616aa015e8cd7d927260cbe0732173cc6a9207dfd3b9f15d19be1c88
-
SHA512
820a19dfc157e3a7d3c762ab471dcc83c9fcb54e34ebf31803a1068cb26b42711a00660c5c0398ec9359ad9781be935123e5c6cd0b5e99bf5433b6b0b4f5a992
-
SSDEEP
3072:QOw0pklIiuq73/IKBds7SdSAS+U3ClaYOSDh:QO5pklIo73wALUAS+U3ktO4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4c841ae9c967982e12480080fa042b1d_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5