Behavioral task
behavioral1
Sample
b80699f9a97c2c6fabe9e37062e2736d_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b80699f9a97c2c6fabe9e37062e2736d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
b80699f9a97c2c6fabe9e37062e2736d_JaffaCakes118
-
Size
242KB
-
MD5
b80699f9a97c2c6fabe9e37062e2736d
-
SHA1
dba870fcef3310cf169e9fb865c4148567666b68
-
SHA256
007cefabb5139034b7a58f77333adf3271346c6f7f194aae024ab35b86618dd2
-
SHA512
a8682d41403ae9f86945890c68943d52980776c52c9ec76db7e27105fbc152545fff39a4bdac6f05efb1723d632170da9e5a6ee2f11768a8f2edf2d8a8996000
-
SSDEEP
1536:Dterikw0HJzwlIiuq73/IKBPdbs0g54HrTPsyBK/dRYGkjKcWXKsJfspdIg:DOw0pklIiuq73/IKBdskQdSvWjJUp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b80699f9a97c2c6fabe9e37062e2736d_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5