Behavioral task
behavioral1
Sample
b24ed51e04b89efdd5fd7da02bf81aba_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b24ed51e04b89efdd5fd7da02bf81aba_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
b24ed51e04b89efdd5fd7da02bf81aba_JaffaCakes118
-
Size
205KB
-
MD5
b24ed51e04b89efdd5fd7da02bf81aba
-
SHA1
5b9e941902c5e8c9300e1a040603c0f7754e5fd2
-
SHA256
34289295d61eae81ac4cdfdc4c726856897973201eafd16efba32f816103b0c6
-
SHA512
3bda6a4dbc3d8d595689d92dd33b24464835e17e87c280715f4d8f1b3881c12b6d892192b2b7e5a75be165abfa758b69cefbec37807881fa48cdee5b9b578a62
-
SSDEEP
1536:VtPrT8wrLT0NeXxz1DweCHrTP9yz5J8bWJ5SNzT6aXzuzbaKHadaqdV:V2w3keXxz1Df6W/m37a3aBdD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b24ed51e04b89efdd5fd7da02bf81aba_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6