Behavioral task
behavioral1
Sample
8cb4a02ecb7080dbd24d4d017d519729_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cb4a02ecb7080dbd24d4d017d519729_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
8cb4a02ecb7080dbd24d4d017d519729_JaffaCakes118
-
Size
238KB
-
MD5
8cb4a02ecb7080dbd24d4d017d519729
-
SHA1
e939732219cdf727867867a68f8b72d8c2261028
-
SHA256
f97dfb18e84f36b7361202c570f6b931392f4ac4e55d9ea60e4cac72c9b9b9fa
-
SHA512
88543e277f55bf6652054e9f622d28248f1e41bbf5356baf0b9f3ff8c18b36279c82019145d23d5699d669823031cebdf9b6aac87bb61e590037a52549ee0d2d
-
SSDEEP
1536:MterT1w1vN8M/EfOgnPJceKBCwba2uHrTPGynK/dRYJxrPXqKMiv/IObMmR8PN:MAw1vPEfOgnPJceKBDafgdSvurCvbMdV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8cb4a02ecb7080dbd24d4d017d519729_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5