Behavioral task
behavioral1
Sample
b7b860966a8b482b31b373b8a4ad6b94_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7b860966a8b482b31b373b8a4ad6b94_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
b7b860966a8b482b31b373b8a4ad6b94_JaffaCakes118
-
Size
241KB
-
MD5
b7b860966a8b482b31b373b8a4ad6b94
-
SHA1
243183e2b96e54e3bcc505eef4f4f2ba62f19e87
-
SHA256
5545e73b986109deb32cd95da0a778503f3581b4dbc4391b4c4548f53c510910
-
SHA512
5c6b680be58cf63515b34ae45557879282d6d664f167da92ff3640a1c43673ceeb2451eb1c4588f5f3a18814f0a0808a65a23304b83a77f127d812d585380e4f
-
SSDEEP
1536:HterTkw9HnXPJguq73/IKB5Kby0g5oHrTPQyNK/dRYEB17KhX1XnTN9mSxwRz8E:Hvw9HXPJguq73/IKBWyQgdS0KhlNW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b7b860966a8b482b31b373b8a4ad6b94_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5