Behavioral task
behavioral1
Sample
bd044c0b622bee91855ae659ce55828a_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd044c0b622bee91855ae659ce55828a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
bd044c0b622bee91855ae659ce55828a_JaffaCakes118
-
Size
242KB
-
MD5
bd044c0b622bee91855ae659ce55828a
-
SHA1
e6dc760b755c46b34da1d86c06864b25b49513ef
-
SHA256
2fc81948281829ab6174ec139526c6312bde363825cbf9a6f0008eaf210c45cd
-
SHA512
cfc013d5ad45db1e61fff6946277299dfbd67c169edf55261db40f96af6992032f0a3cc86006aec04f01c46f30bbb9cbdffb2efae3e09e23f068bce9f4f5db60
-
SSDEEP
1536:Dterikw0HJzwlIiuq73/IKBPdbs0g6oHrTPgytK/dRYchuirJKschdHoOC56j:DOw0pklIiuq73/IKBdspgdSc7rJtc8A
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bd044c0b622bee91855ae659ce55828a_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5