Behavioral task
behavioral1
Sample
a921f35fa8b71b7edf06ce20208a913e_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a921f35fa8b71b7edf06ce20208a913e_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
a921f35fa8b71b7edf06ce20208a913e_JaffaCakes118
-
Size
205KB
-
MD5
a921f35fa8b71b7edf06ce20208a913e
-
SHA1
fb7b80c309c67d8f608acfad3af2979134df7393
-
SHA256
b1212035c7afda74ac4c4b212e55bbf0ff203dd626541232e1f02d53d9f285b3
-
SHA512
5cc3aff92ca35143441da7fbae45d247712a6bbc3a11ce73ce8ee770c4d25be9ec9cf1e16cd1087422bfe6a3e1837db812151085cd5a1835617ece4e1b613c3f
-
SSDEEP
1536:0tPrT8wrLT0NeXxz1Dwe5HrTPLyF5J8bwXqxD7pS++4IBfPJLE:02w3keXxz1Df5oFXq17pS+gPJ4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a921f35fa8b71b7edf06ce20208a913e_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6