Behavioral task
behavioral1
Sample
635e0b3decdc6bd51760fddf495b9527_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
635e0b3decdc6bd51760fddf495b9527_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
635e0b3decdc6bd51760fddf495b9527_JaffaCakes118
-
Size
205KB
-
MD5
635e0b3decdc6bd51760fddf495b9527
-
SHA1
a59d141a2ade0e98d36afa2008d0ed9c7a28fe0b
-
SHA256
de955cceb338ca2def37a9273435e0a238fa80f4867854141738c9cc47b38eaf
-
SHA512
42a1095fbce587daaeee7e404203a5a2923f39dd2adfa2f819f2b858145d83606c4b62efc04b967c14d20c19b4187be261db560be745d1bf2796ef43fe722de7
-
SSDEEP
1536:OtPrT8wrLT0NeXxz1DwelHrTP0ym5J8blNhNHeL+2XdyzzAd6cr5p2X:O2w3keXxz1DfF6ghN0+2XdwAd8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
635e0b3decdc6bd51760fddf495b9527_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6