Behavioral task
behavioral1
Sample
d7477feb312f9f76ea3c9273e4a01ca8_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7477feb312f9f76ea3c9273e4a01ca8_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d7477feb312f9f76ea3c9273e4a01ca8_JaffaCakes118
-
Size
205KB
-
MD5
d7477feb312f9f76ea3c9273e4a01ca8
-
SHA1
3b0312e9bee594b784c65295c547e4a5218f7aa7
-
SHA256
5b9b8e1d76d1ff23d8c7002b7337a6021a859dd767c5d321a7c7e48bbb7e49ac
-
SHA512
ff73b0c5a8472dc522c5d50022df80abd2106e0ffb26e110ef6c3966c126d7841b0785f233609ae9b69b06a537648bd541d2a731330045d9c42f9d89316ed4dc
-
SSDEEP
1536:JtPrT8wrLT0NeXxz1DweCHrTPayY5J8bOf27VH3gkoUNFqsENgb:J2w3keXxz1Df6yr2JwkxkRNgb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d7477feb312f9f76ea3c9273e4a01ca8_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6