Behavioral task
behavioral1
Sample
a10559b5e792aa24b7f7da58601d53c2_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a10559b5e792aa24b7f7da58601d53c2_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
a10559b5e792aa24b7f7da58601d53c2_JaffaCakes118
-
Size
205KB
-
MD5
a10559b5e792aa24b7f7da58601d53c2
-
SHA1
13999e65617edd96891a327d41ab82fef91f57b6
-
SHA256
f648686dc1f75e6f640491fb42e0e87f0e7c4868963b2cdc979532ba468d6c78
-
SHA512
73ad782f60cb71ca0a094acdae2e7b1191f27ab3cb31f13e5c696c3fb1e841658820d9036f129df2b9ba02c5c1983726614a04e31e178ed59ebb2f24fff6aab0
-
SSDEEP
1536:1tPrT8wrLT0NeXxz1DweBHrTPwyq5J8bpOTZvAxkYwO8+gPFb9xamhM+yDW:12w3keXxz1DfBKU7wO7Gj/3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a10559b5e792aa24b7f7da58601d53c2_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6