Behavioral task
behavioral1
Sample
6ca9f5d9b0304bc3a8246cf86e6db21f_JaffaCakes118.doc
Resource
win7-20240708-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
6ca9f5d9b0304bc3a8246cf86e6db21f_JaffaCakes118.doc
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
6ca9f5d9b0304bc3a8246cf86e6db21f_JaffaCakes118
-
Size
239KB
-
MD5
6ca9f5d9b0304bc3a8246cf86e6db21f
-
SHA1
7df607ec1c90746aa90f3ea2555dd4cae9f61766
-
SHA256
d4654f010021371fe8cb182fc484cdece66f681ed7335e79befa145a21ef3079
-
SHA512
e20dcb927ba4071afd16043ab40b6052aed1e8dd69f73a1303e2fa8e1c89d33970c19b9cd1a941d5b99889eeebbfe2864c34bb27641bc556fae7c72e476c387a
-
SSDEEP
3072:X/wDvWETOgnHJcIKBs7iEdSqctNi7n4mwL:X/avWETrHJ9AGUNt074mK
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6ca9f5d9b0304bc3a8246cf86e6db21f_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5