Behavioral task
behavioral1
Sample
ce6e346374a7f79cf23b8139a860e238_JaffaCakes118.doc
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
ce6e346374a7f79cf23b8139a860e238_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
ce6e346374a7f79cf23b8139a860e238_JaffaCakes118
-
Size
242KB
-
MD5
ce6e346374a7f79cf23b8139a860e238
-
SHA1
98342b1363a5b2c537908d7b7bba9cb6f29c3afe
-
SHA256
48a6700a338d708985e40a2cd800fad07948072368b5b960d1f2372486738836
-
SHA512
38504e61cbf26d02df9a1191dd8a1f84349d64afa3b30ccd4d9f76fe94f2f16d14b836a358302eb0032035faddb9a67ba50fa164e531521ddc21d4f76cce0853
-
SSDEEP
3072:jvw9HXPJguq73/IKBWyXQdSvDwdAPaR8xJv4i:jvKHXPJi73wA2U72slxp
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce6e346374a7f79cf23b8139a860e238_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5