Behavioral task
behavioral1
Sample
59fbe1eeac3cb4a2d449cbfddfe9c2e3_JaffaCakes118.doc
Resource
win7-20240708-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
59fbe1eeac3cb4a2d449cbfddfe9c2e3_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
59fbe1eeac3cb4a2d449cbfddfe9c2e3_JaffaCakes118
-
Size
238KB
-
MD5
59fbe1eeac3cb4a2d449cbfddfe9c2e3
-
SHA1
6877d9d20cdd90a5317e3dba01ea56907e121214
-
SHA256
aee128b5d7a55eb5e51755103154d6e1b3bb9c7b1c1e2a4fa15409f160ceff61
-
SHA512
7a33e8fc1c50c35964b1d582a8ea4c013306da973a3ef0c841f5826cf6a09796925c4afa0b8f665cad9a396cd953dc32e2e4353b97705f8ee0cbc079f0a0cf63
-
SSDEEP
3072:j/wDvWETOgnHJcIKBs7YOdSshYc5Zx6Yb7A:j/avWETrHJ9AmUq/ZxB7A
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
59fbe1eeac3cb4a2d449cbfddfe9c2e3_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5