Behavioral task
behavioral1
Sample
cfabdccddaf032361b3cf7ff86c59e05_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfabdccddaf032361b3cf7ff86c59e05_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
cfabdccddaf032361b3cf7ff86c59e05_JaffaCakes118
-
Size
242KB
-
MD5
cfabdccddaf032361b3cf7ff86c59e05
-
SHA1
8d67b1145305d1afc94b92c1cdb0da914f4d9f1d
-
SHA256
e0ec1d3fbb11ea8c6c39950a692f02546d025b490170d891af60898faff4c153
-
SHA512
3b8b58a47376b8f5b103ae5a95fee7e75551971a5d2b27efbbeedb337ddf3423ae952aa05489cec311fc67aba45fa260eebd92c9e74980b8530fdbf8c7d2d00a
-
SSDEEP
1536:xterTkw9HnXPJguq73/IKB5Kby0gewHrTPQy9K/dRYwwVYFAMJCu3i+0Gkd:xvw9HXPJguq73/IKBWyVIdSww+mECuO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cfabdccddaf032361b3cf7ff86c59e05_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5