Behavioral task
behavioral1
Sample
b8e2495911cb0a984c84e9177b3ef262_JaffaCakes118.doc
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
b8e2495911cb0a984c84e9177b3ef262_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
b8e2495911cb0a984c84e9177b3ef262_JaffaCakes118
-
Size
242KB
-
MD5
b8e2495911cb0a984c84e9177b3ef262
-
SHA1
8c6a38b708a5a1cfd766e7420387655ba6cd349e
-
SHA256
5422285e00293e3c4141df20986f7eed88bacc24dbc200a7f3096736ba440976
-
SHA512
90f4df246cb096bf5168ecaf0046df775b23d7ab49302f950753ccc117dc40db508b5863290171d778a31097d726b88f848579e699b2ddfe84f2b0334f2773d8
-
SSDEEP
3072:Mvw9HXPJguq73/IKBWy9odSEkfqd06t6e3N:MvKHXPJi73wAMUhqdLnN
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b8e2495911cb0a984c84e9177b3ef262_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5