Behavioral task
behavioral1
Sample
a3487cc05e939d17bc4216830df20cd5_JaffaCakes118.doc
Resource
win7-20240708-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3487cc05e939d17bc4216830df20cd5_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
a3487cc05e939d17bc4216830df20cd5_JaffaCakes118
-
Size
242KB
-
MD5
a3487cc05e939d17bc4216830df20cd5
-
SHA1
47a95604355f4cfc13598f68e778fa7c33104386
-
SHA256
03c0d942d9b970ce269c2a8688ca52aa225e51bc9660fd62ea0440d82e2850b7
-
SHA512
fcb09efc243a2bf7afc730e5dd63e466647f152d2dff053d49edab9633c4e3e483f408ec4749bf6c39b548ac19d5cc53bd6d7b48dd5b5abd4a395a16a2b3b7a8
-
SSDEEP
3072:lOw0pklIiuq73/IKBdsF4dS/AuH/kw01vQA:lO5pklIo73wAnU4Esw8r
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a3487cc05e939d17bc4216830df20cd5_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5