Behavioral task
behavioral1
Sample
b26379c36f6dd95a9c3bcc330b0f533f_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b26379c36f6dd95a9c3bcc330b0f533f_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
b26379c36f6dd95a9c3bcc330b0f533f_JaffaCakes118
-
Size
205KB
-
MD5
b26379c36f6dd95a9c3bcc330b0f533f
-
SHA1
ae68e24a9965a3d57cfcdec4de9c62a29f3e49cd
-
SHA256
308c92b92eb11f97620381ffeb5a1d55e10a1691c10113f6c62835e1853f7127
-
SHA512
e5721ff8c03400ab792e6fad537b6028ebad262b873df549bd0d943f689f9d760b10f8de0e6ba80a4c8c567b5e7f014497e5bfc44e929e84a7b09498e04b10a6
-
SSDEEP
1536:mtPrT8wrLT0NeXxz1DwewHrTPMyO5J8bJcA9sDDwD2RRAaGwABtU7PmR0Hm:m2w3keXxz1DfsaUcAxD1LtSa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b26379c36f6dd95a9c3bcc330b0f533f_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6