Behavioral task
behavioral1
Sample
b114b9886cca34a438cd251e0a07b385_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b114b9886cca34a438cd251e0a07b385_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
b114b9886cca34a438cd251e0a07b385_JaffaCakes118
-
Size
242KB
-
MD5
b114b9886cca34a438cd251e0a07b385
-
SHA1
be6e868d17b01844629b01175942aa1555190a17
-
SHA256
6b752e3633657834a5bbce03ccb884eca53d2f79a5f773433a91c0a4c367f762
-
SHA512
c75a5b0b7b57ffab78dc53f5dd14b9c1998ea94236c3018bdf549f86ab9eb5b49c5743b6b3458e2673ed80b90d0ec605e721fbf8a31deb86211d63251c1c0197
-
SSDEEP
1536:JxterTkw9HnXPJguq73/IKB5Kby0gWfHrTPhy8K/dRYje2boz4fINOuXfg:bvw9HXPJguq73/IKBWy2mdSje2Eg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b114b9886cca34a438cd251e0a07b385_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5