Behavioral task
behavioral1
Sample
ce0b492ead649ec0f969f7707dbbd095_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ce0b492ead649ec0f969f7707dbbd095_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ce0b492ead649ec0f969f7707dbbd095_JaffaCakes118
-
Size
205KB
-
MD5
ce0b492ead649ec0f969f7707dbbd095
-
SHA1
512deddfbd6d2379b03b29377dd2f00db6169a89
-
SHA256
3142fc23152d5280d5632adb1242f3561384c401c5f797e0ef00e3c4bd7d94ef
-
SHA512
89bae7634c0b852a28994a30cd022a44b60241a8846b069768ba5c94e4b95f7a52b97c912610644f8f07df645166af34ce9b24f73dfb35fe0484fff6eb67c18e
-
SSDEEP
1536:7tPrT8wrLT0NeXxz1DweEHrTP/yx5J8brjuQjfh+d+VwBhUJmQuNKuLD4ZWJ:72w3keXxz1DfgUrQjp+dsmPNH9J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce0b492ead649ec0f969f7707dbbd095_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6