Behavioral task
behavioral1
Sample
a9a82defa395e12347d02955a45cc361_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a9a82defa395e12347d02955a45cc361_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
a9a82defa395e12347d02955a45cc361_JaffaCakes118
-
Size
242KB
-
MD5
a9a82defa395e12347d02955a45cc361
-
SHA1
60c95cc90a019658ac6dd92d56104df205cb8e4d
-
SHA256
8da34043e649e26d046c83b8c62ef3ec5ac5293229b94ba2b65914f4836d973f
-
SHA512
2ed5acf7f07c197594207a689d1a0bc1c8a2a310a0f88091232a1caf81ec0b988e1d25169c64fbe77501ecbb69fda549ee1567a586baccdfe1936159fdde5024
-
SSDEEP
1536:SterTkw9HnXPJguq73/IKB5Kby0griHrTPGyHK/dRYRc8ijX2XBy+zN4Py+:Svw9HXPJguq73/IKBWysQdSRFXZN4K+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a9a82defa395e12347d02955a45cc361_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5