Behavioral task
behavioral1
Sample
5a25a19fce60eb1c8d97d48e152d8a7a_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a25a19fce60eb1c8d97d48e152d8a7a_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
5a25a19fce60eb1c8d97d48e152d8a7a_JaffaCakes118
-
Size
243KB
-
MD5
5a25a19fce60eb1c8d97d48e152d8a7a
-
SHA1
b37edd5393d67c4f2d4960ee52c74bb9b6af495a
-
SHA256
7e5b59324fbbf5f6d4ae560b5f3d5366c542d88e55cbc454dee930d2d3868c4a
-
SHA512
7141209dc6703162eec4939bdac7bb69034c427040f509615e18d61a645f17e36f278f022fa153e34a55f4626ee329445ebe00eb07b7f4b12ef650661a4801a9
-
SSDEEP
1536:aterikw0HJzwlIiuq73/IKBPdbs0gkGHrTPyy7K/dRYEuxQ1R64Rls:aOw0pklIiuq73/IKBdsBYdSEuxQ1Jq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5a25a19fce60eb1c8d97d48e152d8a7a_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5