Behavioral task
behavioral1
Sample
b7d9a55e5d09e6d3158dad73467a0a56_JaffaCakes118.doc
Resource
win7-20240705-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
b7d9a55e5d09e6d3158dad73467a0a56_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
b7d9a55e5d09e6d3158dad73467a0a56_JaffaCakes118
-
Size
236KB
-
MD5
b7d9a55e5d09e6d3158dad73467a0a56
-
SHA1
5e240de336c9069f42ff8662acebb1600df04b94
-
SHA256
c0b0914cdd90135e5d63738040860f6dbb5e9211c52238b6bbc3978d519632aa
-
SHA512
2de7d33303c28a99c58741755090b7842e3c413daea4a83ffac265459fee5f855084f9840147f8f653f0ecdd5cbc1e33ae2d1555c3be03fa664d8698dd54af18
-
SSDEEP
3072:f/wjd5s1mermyHKxYqdS6eK2QnvbM0guW:f/md5sNrmMuU6e7ovbMDJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b7d9a55e5d09e6d3158dad73467a0a56_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5