Behavioral task
behavioral1
Sample
6000f7144f77ac99acb5dcc225840e4c_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6000f7144f77ac99acb5dcc225840e4c_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
6000f7144f77ac99acb5dcc225840e4c_JaffaCakes118
-
Size
205KB
-
MD5
6000f7144f77ac99acb5dcc225840e4c
-
SHA1
db24ad4f0d835f0c6c0d8995e11f8ab92866df73
-
SHA256
8878d84ecc4d7fb164032b2eb95baeff09de15c1809bc4478a7b4ef4c67646d8
-
SHA512
95a3c83c815095dc00db7cc62024f30a4f3aa5f1721d77f92014b716a5a942a0f028658ff22346182c8c6265316dbe3a0ad527823e286c640ecb8893b64b4a8e
-
SSDEEP
1536:+tPrT8wrLT0NeXxz1DweuHrTPnyZ5J8busn5nHOnBen1gjJgCCC+lVsnDgSo4qs7:+2w3keXxz1DfGMJs4nBBJl+8nDgzs7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6000f7144f77ac99acb5dcc225840e4c_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6