Behavioral task
behavioral1
Sample
78a2e4103c765e3d1dd478d201882600_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78a2e4103c765e3d1dd478d201882600_JaffaCakes118.doc
Resource
win10v2004-20240709-en
General
-
Target
78a2e4103c765e3d1dd478d201882600_JaffaCakes118
-
Size
242KB
-
MD5
78a2e4103c765e3d1dd478d201882600
-
SHA1
4a7454c2ad6a4cda5d39aa29bedc3307431801b8
-
SHA256
a3c998f8c83510b411238e927a47c78ee4a4979b8cf33516f8431c4ba5cf835b
-
SHA512
797a8aadd78a8176cdbd58f59a11ae48622ccad47313425f7276102bbc4ab7708bfefe49b0f21e67075e35ae5a5c8b51abc5ac4ba9ab43eb455f7e9c929d3e8f
-
SSDEEP
1536:aterTkw9HnXPJguq73/IKB5Kby0ggzHrTP9yQK/dRYorDUanipSLqR648m4L:avw9HXPJguq73/IKBWyMWdSjanhYcL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
78a2e4103c765e3d1dd478d201882600_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5