Behavioral task
behavioral1
Sample
aa84480b9187dc3e21b43a37d3a2af23_JaffaCakes118.doc
Resource
win7-20240705-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
aa84480b9187dc3e21b43a37d3a2af23_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
aa84480b9187dc3e21b43a37d3a2af23_JaffaCakes118
-
Size
238KB
-
MD5
aa84480b9187dc3e21b43a37d3a2af23
-
SHA1
52a48e186a57acc4b9a246a255091b1b40a78109
-
SHA256
d48420fbddf6bcc48f4af743d257bf16a349e1cb61c1f65740ed2840b2de32a6
-
SHA512
8825769eaa9b326520b5edf062dbd32fbad8284f31fd8f203808e416a3599ac1d6c4ca1a81e453bd6261c4f76837cb327d3dbb706ced5eb788abc868ae84fbd1
-
SSDEEP
3072:UAw1vPEfOgnPJceKBDanGdSPsi31/MrKX:UAKvPEfrPJBAfUPsiGc
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
aa84480b9187dc3e21b43a37d3a2af23_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5