Behavioral task
behavioral1
Sample
60195396ef0bbed0ae7c791814b09148_JaffaCakes118.doc
Resource
win7-20240704-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
60195396ef0bbed0ae7c791814b09148_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
60195396ef0bbed0ae7c791814b09148_JaffaCakes118
-
Size
242KB
-
MD5
60195396ef0bbed0ae7c791814b09148
-
SHA1
8e6889ce2fe0fd794323eed77835ff2838af9ca6
-
SHA256
f41472d1416489f74e740d63f6791c38eb04a12184ba535e8bde8f0493f6741d
-
SHA512
52ec438049817fddc84635f552cb64c882cb4ac66d1017d1e6942f8b3794e325652ba260eef63461ed6c8477bd837aa30eb4d2a98edf3f176187ec489c140776
-
SSDEEP
3072:nvw9HXPJguq73/IKBWy4AdSYUKXrl7ohF+:nvKHXPJi73wAPUY5XGhU
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
60195396ef0bbed0ae7c791814b09148_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5