Behavioral task
behavioral1
Sample
d0aed54eeb55ab85b3c472d73c2b1127_JaffaCakes118.doc
Resource
win7-20240903-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
d0aed54eeb55ab85b3c472d73c2b1127_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
d0aed54eeb55ab85b3c472d73c2b1127_JaffaCakes118
-
Size
239KB
-
MD5
d0aed54eeb55ab85b3c472d73c2b1127
-
SHA1
de8bca4bd0937e19d269561946ebfd4ebb59a514
-
SHA256
1c3faaf94c3dd0e8332be7949910f8c37f6579d752d9e955f2a22a893b3d3c59
-
SHA512
000abb71d675d2a86958c7f19a61f1b05e869f47d494a3fd29e125a8f004685f4a2cf66da7625f82c84680ff4357829f4096d39668102479aa4d52f7f5ba0db9
-
SSDEEP
3072:C/wDvWETOgnHJcIKBs7FidS5YSDIq/MpFXV:C/avWETrHJ9ApUPIq/aFl
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d0aed54eeb55ab85b3c472d73c2b1127_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5