Behavioral task
behavioral1
Sample
b376e7fbea1573dd13a3df1f8f1d588d_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b376e7fbea1573dd13a3df1f8f1d588d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
b376e7fbea1573dd13a3df1f8f1d588d_JaffaCakes118
-
Size
204KB
-
MD5
b376e7fbea1573dd13a3df1f8f1d588d
-
SHA1
86bdc0cdf66a0d1d1f9d46e8dad91840f4373ffe
-
SHA256
d3a1ef75d9356b23ce0e8dee5851911c42ad35ce411403639cc989e72e53af83
-
SHA512
deb4f13cf7e03154a5873625a93be5124c1a91bd9a7910ad62a20d527d5dbebd7759e3c1089440f35565132e25a7dc93e6e947db58254ddc8b0d34e650971517
-
SSDEEP
1536:ltPrT8wrLT0NeXxz1DweyHrTPry15J8bQutSwGfQpg8qxqhvwkKPDSV:l2w3keXxz1DfqAy6O2WvwkfV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b376e7fbea1573dd13a3df1f8f1d588d_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6