Behavioral task
behavioral1
Sample
63772ef8dba7c2ba794ce41d66244f87_JaffaCakes118.doc
Resource
win7-20240705-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
63772ef8dba7c2ba794ce41d66244f87_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
63772ef8dba7c2ba794ce41d66244f87_JaffaCakes118
-
Size
242KB
-
MD5
63772ef8dba7c2ba794ce41d66244f87
-
SHA1
dd99a447c02acb19dd932b5e88bfb33b4cd1494e
-
SHA256
06c86707e7277d3557073210f0c960e1733555755fd54c6f42075986ea93ada5
-
SHA512
80244cecf5e2ecec1877c17c537b92239755af8745d9d50f15869b2a9a5095bd1eb324fb04943d685664ebef310a58586377aa1b00cd6fcc6ba3b2b74ef6d83e
-
SSDEEP
3072:yvw9HXPJguq73/IKBWyN8dSBq+oOIpMIpBS3n:yvKHXPJi73wAoU8f0X
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
63772ef8dba7c2ba794ce41d66244f87_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5