Behavioral task
behavioral1
Sample
ac755e3dcef2f9800197f9afe51af3c6_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac755e3dcef2f9800197f9afe51af3c6_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ac755e3dcef2f9800197f9afe51af3c6_JaffaCakes118
-
Size
242KB
-
MD5
ac755e3dcef2f9800197f9afe51af3c6
-
SHA1
6021487210dde0aa97c9a83ac28bd287776b4827
-
SHA256
88ef7bd46c210539db0a3662027c4287d03931f4fab4bc24cc04925ee8db15ef
-
SHA512
de10f22492b86c692153a85d8fc0041c6bf4ec60192da808df8fc0b65ffbcd6e4935f8a315fcb537016a67b6b127672b8ec70c65bb444c288a20b1a860b5a192
-
SSDEEP
1536:NterTkw9HnXPJguq73/IKB5Kby0gGgHrTPsyRK/dRY91NnrukqpSOUhMOJCFBArT:Nvw9HXPJguq73/IKBWyNAdS91crUhJJ9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ac755e3dcef2f9800197f9afe51af3c6_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5