Behavioral task
behavioral1
Sample
8bd1344d605a331d0c95140adc10dedf_JaffaCakes118.doc
Resource
win7-20240708-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
8bd1344d605a331d0c95140adc10dedf_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
8bd1344d605a331d0c95140adc10dedf_JaffaCakes118
-
Size
239KB
-
MD5
8bd1344d605a331d0c95140adc10dedf
-
SHA1
38365dd74bf0698ff512a7233588be86865d601e
-
SHA256
2fe6498c74c00c994a8e5858ade40e5bfdf9a515e7a787cfb8cad95a395f7aaa
-
SHA512
2da9d83940ea0c6ebd076adf8877b45d20e04c769076a113fb809d99a790b0eea8e6c3eec5f882cfce274979e6778b281209f9b580ce54ab064a88950ea27ed6
-
SSDEEP
3072:L/wDvWETOgnHJcIKBs728dSMVfhT4MeNfhr:L/avWETrHJ9AGUMjTyz
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8bd1344d605a331d0c95140adc10dedf_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5