Behavioral task
behavioral1
Sample
87b1195dd4ebae7b06e2322bff4d12d9_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
87b1195dd4ebae7b06e2322bff4d12d9_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
87b1195dd4ebae7b06e2322bff4d12d9_JaffaCakes118
-
Size
205KB
-
MD5
87b1195dd4ebae7b06e2322bff4d12d9
-
SHA1
c5072889c6fb9b789b77bd935416a5ec2e982625
-
SHA256
50061fe9ad7be528c0255189969efdef6592cdb1d516c77383f1216f3978199b
-
SHA512
dea51ed1eb2fedd9dec19b235f810488f482c83a9e317cdd5b1d632e547440e2a5c6087bb06681791c1b5466e776994b5290352b23e064af6e5f6a8ff90c93e8
-
SSDEEP
1536:stPrT8wrLT0NeXxz1DweYHrTPRy/5J8bH4uWM9iNzT3Z4Lf5g7vRObgC320T:s2w3keXxz1Df0YIBW396dgNObdT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
87b1195dd4ebae7b06e2322bff4d12d9_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6