Behavioral task
behavioral1
Sample
6665ab44db118b972ce2a88e66118fb8_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6665ab44db118b972ce2a88e66118fb8_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
6665ab44db118b972ce2a88e66118fb8_JaffaCakes118
-
Size
235KB
-
MD5
6665ab44db118b972ce2a88e66118fb8
-
SHA1
fee2da365e916da5c67e7c9ac1f011651b538009
-
SHA256
3fb97d9c2e1864424882af8744978f5c367b27f5fa6b2a857621f126e758a6f9
-
SHA512
0ebcd4d975f56369d1b53b9c3c0f78a4a2e5bd1e1a28a083286d08318bdc3372b793811b5fd692de9fbcc5132f960c3a1b32149ee35b1386e70bfc7f5cd9f71b
-
SSDEEP
1536:zterThwxEM5OsmqrmrAK9hbZQHrTPUyZK/dRYiX/CN7Ta861YrkyXkHx:zUwxv5OsmqrmrAKHigdSivCFTH6C2Hx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6665ab44db118b972ce2a88e66118fb8_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5