Behavioral task
behavioral1
Sample
697b1efee889309a24cce11f5b71c729_JaffaCakes118.doc
Resource
win7-20240704-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
697b1efee889309a24cce11f5b71c729_JaffaCakes118.doc
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
697b1efee889309a24cce11f5b71c729_JaffaCakes118
-
Size
242KB
-
MD5
697b1efee889309a24cce11f5b71c729
-
SHA1
089029c2d744ba7a9bf7871b3cede8dbe16d4767
-
SHA256
6aaba7e0039ca326d018736a0b840c6b08f52d6d39f1080d242570a54df03f67
-
SHA512
b6bfff2b7165d73ad4d703326b0c80225f0e46cbd95b8b069d69bf21b33ae60a0cfd3d8ef9f88b5e3a06c6195ac270f6823f9a66efdb54dea926ce2f06c48c31
-
SSDEEP
3072:hOw0pklIiuq73/IKBdsXwdS+DAcukVDwY03:hO5pklIo73wAhU+DAcurYY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
697b1efee889309a24cce11f5b71c729_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5