Behavioral task
behavioral1
Sample
5b50d72de3bbef53429ee319e3cc5769_JaffaCakes118.doc
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b50d72de3bbef53429ee319e3cc5769_JaffaCakes118.doc
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
5b50d72de3bbef53429ee319e3cc5769_JaffaCakes118
-
Size
242KB
-
MD5
5b50d72de3bbef53429ee319e3cc5769
-
SHA1
982d1f2c285137d479590c65914424bee41a60ae
-
SHA256
452e449ec4a159f0a6e7c714670371784f26121226a64f31241bb0d868766f6e
-
SHA512
9429a72296b55f935f70bfb55ac73933617412e6bcf5942324f95e8d60cad2b0a2487fb54d5bdf69e656a73ee53411d7326cef8478c39274732502a86f4a8d17
-
SSDEEP
3072:Wvw9HXPJguq73/IKBWyOGdS1k6LTID/PnLd:WvKHXPJi73wAzU1NLOXLd
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5b50d72de3bbef53429ee319e3cc5769_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5