Behavioral task
behavioral1
Sample
82335147b1272190c0a7e54b1b0fdf42_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
82335147b1272190c0a7e54b1b0fdf42_JaffaCakes118.doc
Resource
win10v2004-20240730-en
General
-
Target
82335147b1272190c0a7e54b1b0fdf42_JaffaCakes118
-
Size
205KB
-
MD5
82335147b1272190c0a7e54b1b0fdf42
-
SHA1
839ead1206a5632fd8f7bd290b3d7759f55e2faf
-
SHA256
88b1daa6578d02b2912491baa1ecbd724e20750f7adc0e2fc2e15d47069303aa
-
SHA512
04d0ccecf0508d36553fab3c6eb9440b60978a61b7fad03484ac15367eb04b03b67129226f48d86d4766d34b9914b3c3420231c83e5e7a200bb95ed71eee21b6
-
SSDEEP
1536:BtPrT8wrLT0NeXxz1DweyHrTPryl5J8bjxTuySvPdmYBpa/c6W:B2w3keXxz1DfqIAEvVmYBcrW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
82335147b1272190c0a7e54b1b0fdf42_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6