Behavioral task
behavioral1
Sample
c17ca2addc4a297df5c312d0aa664e6a_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c17ca2addc4a297df5c312d0aa664e6a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c17ca2addc4a297df5c312d0aa664e6a_JaffaCakes118
-
Size
235KB
-
MD5
c17ca2addc4a297df5c312d0aa664e6a
-
SHA1
e20165c8dba0a68f30292bb7cdd6915375f5ca27
-
SHA256
21c90cbf3faf1aac88eaf7c9bbe8e4f33ed46cd434c9e8b548e3c11697cb4061
-
SHA512
508861bac12506f1f4599bf2a08d998e4be37031c3289475b367b778f22738683574d945a28553ea046c8b78e9ec078cddf14d1687f96d94a9f0e6cdefeb2a85
-
SSDEEP
1536:nterihwjEu5s1mermyzrKXhbpIHrTPiybK/dRYdxinVJGHoOmHyrVJTObDYt:n/wjd5s1mermyHKxagdS/OGIQiDS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c17ca2addc4a297df5c312d0aa664e6a_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5