Behavioral task
behavioral1
Sample
R5180448.doc
Resource
win7-20240708-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
R5180448.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
b92dfc33e462eece52235659a42e7b43_JaffaCakes118
-
Size
329KB
-
MD5
b92dfc33e462eece52235659a42e7b43
-
SHA1
0e783028fc1edcff19733e639e2f7372fa21911f
-
SHA256
ff23db6bb877215183ee77e771c2cea02d8b7138b49121cf74c4af96bce84024
-
SHA512
b778c7ef2607c168d6f9de74722a43784c835c10bf334b35793e78849e8653f42e212e0db210a6c699628dfe4eceb9446e89dba25923cecf0f0376bdf2303f52
-
SSDEEP
6144:ZpgFW+U8sbtP4bJHEUJX6kO0OrKFpPMMfhI1R2TPWtAu3TX3hZai+RF/MwW:MHEm402AM2q8IAaTXiRF/MwW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/R5180448.doc office_macro_on_action -
resource static1/unpack001/R5180448.doc
Files
-
b92dfc33e462eece52235659a42e7b43_JaffaCakes118.eml
-
R5180448.doc.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
-
email-html-2.txt.html
-
email-plain-1.txt