Behavioral task
behavioral1
Sample
ad1c06a6b981065b34ed00c119d74e01_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad1c06a6b981065b34ed00c119d74e01_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ad1c06a6b981065b34ed00c119d74e01_JaffaCakes118
-
Size
205KB
-
MD5
ad1c06a6b981065b34ed00c119d74e01
-
SHA1
cb59189587d4fc24534918fbf73767c49f12d740
-
SHA256
6111dfd290e7e711cd3f78623c5b32e101467f66e50e6a6f62572f46452e93bf
-
SHA512
6b483c7f5a8d4b8977829a739cdf45884875b745d878eb6a2f8bedcb531aa6f9afa4af19c09eab168855702040532d067b259c0329c39b822f96624abb74d8da
-
SSDEEP
1536:ltPrT8wrLT0NeXxz1DweXHrTP5yH5J8b1/Kc96uyHzcARybBi6JUZdG:l2w3keXxz1Df7Uc/Kc1yYayFi6N
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ad1c06a6b981065b34ed00c119d74e01_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6