Behavioral task
behavioral1
Sample
d2b395e45e1b74b0f1f78fab4a3aba50_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2b395e45e1b74b0f1f78fab4a3aba50_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d2b395e45e1b74b0f1f78fab4a3aba50_JaffaCakes118
-
Size
234KB
-
MD5
d2b395e45e1b74b0f1f78fab4a3aba50
-
SHA1
8ff631d1c3898093e69943695a6927ce32dd9ca1
-
SHA256
3db15a8a9c6b0c969d1e5855c9c27540afeecd2f43e1c998a5aacb49267d23eb
-
SHA512
70f83c53ebd5de49d0ad353265661929462cd4f8a5a91cee2f0fd076055eab816df2f10770b5b2be31930fd03610e7b25024af1ea6a8a3f9f556643588887490
-
SSDEEP
1536:wterThwxEM5OsmqrmrAK9hbfyHrTPmyHK/dRY9oaGHCzO2op7WeDrg5LM:wUwxv5OsmqrmrAKHS8dS9dnRWXrg5Y
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d2b395e45e1b74b0f1f78fab4a3aba50_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5