Behavioral task
behavioral1
Sample
9fe829d097acca3423fcc6df6666b52d_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9fe829d097acca3423fcc6df6666b52d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
9fe829d097acca3423fcc6df6666b52d_JaffaCakes118
-
Size
239KB
-
MD5
9fe829d097acca3423fcc6df6666b52d
-
SHA1
2ac7468b30aea7d962e98b466940912577e352c6
-
SHA256
3cb0b4bb1c14c7a10398abccd291cc5b5dcd86fdd7aeecfcbb86b7f4161bc00d
-
SHA512
fd4e75fb85548191e4a00e6395aed2af054359a26f66173134b30fc4cc70eb5e4e03cf1e1ddac28743462fac5aa954961ae7d2864184033591b2a1d38fdde2ca
-
SSDEEP
1536:aterU1wDv/6MaETOgnHJcIKBC5bvzsLHrTPfyOK/dRYipyhv7gz1VYyAOm:a/wDvWETOgnHJcIKBs7qAdSJc5VKOm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9fe829d097acca3423fcc6df6666b52d_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5