Behavioral task
behavioral1
Sample
5f11de514f3d3509503e6b8efb07f74f_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f11de514f3d3509503e6b8efb07f74f_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
5f11de514f3d3509503e6b8efb07f74f_JaffaCakes118
-
Size
241KB
-
MD5
5f11de514f3d3509503e6b8efb07f74f
-
SHA1
707a13ec3e6cd3e806256e0dc6fadfededb26b14
-
SHA256
1d9e75a4a65f357562afa337b0d6c482ed2ba707d55ec618fc16fe9610445d50
-
SHA512
055f6b0895daa14f21ed160a845a5e56daf9318237e30d2d2d39eee2e5d36adb86846ff3242831a857672de88bf0dc47c8de77d84ef9688999253e06e43784a5
-
SSDEEP
1536:zterTkw9HnXPJguq73/IKB5Kby0gmJHrTP7yiK/dRYm4whVi9zCEAw0Ffu:zvw9HXPJguq73/IKBWy8qdSLImAhu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5f11de514f3d3509503e6b8efb07f74f_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5