Behavioral task
behavioral1
Sample
aa1e8928d187f668c86e70d44c03142a_JaffaCakes118.doc
Resource
win7-20240708-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
aa1e8928d187f668c86e70d44c03142a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
aa1e8928d187f668c86e70d44c03142a_JaffaCakes118
-
Size
235KB
-
MD5
aa1e8928d187f668c86e70d44c03142a
-
SHA1
4d766dffb5df46f877bc3b0c6fcf935e0d1e2e9a
-
SHA256
f6e0f225c7dcc361dc1eb564158951f6263a822d8eda1753b84e0f220724d815
-
SHA512
b4f9c95f8ec5480a28878b544802fffda0cacf15ab49ce8e86885f1a97faa40a834349b9d0e779ebf479997d7ff5913718f7a1877ade8b2332da9b474f020a48
-
SSDEEP
3072:f/wjd5s1mermyHKxHEdSSTIr1uEJJhM/H7Nr7VT:f/md5sNrmMxUZrUChMjNZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
aa1e8928d187f668c86e70d44c03142a_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5