Behavioral task
behavioral1
Sample
da4d3e14116ce6d8a5dccd507ee9a68d_JaffaCakes118.doc
Resource
win7-20240903-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
da4d3e14116ce6d8a5dccd507ee9a68d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
da4d3e14116ce6d8a5dccd507ee9a68d_JaffaCakes118
-
Size
241KB
-
MD5
da4d3e14116ce6d8a5dccd507ee9a68d
-
SHA1
d0a6d9be304c092e1f2332f8638abe7d5501be88
-
SHA256
5b5fcbfa52ee77781c834bebf95cd71ea3e4fa2736ac5b45a0b492a4f0444bc4
-
SHA512
3bb71120f561b4ea0c23c589cb89b58fea5cf2822a8e048c0760f3ff0447390b1ef1d908ae65b8c6090e2d22b942e5e077812b3bf3f7806ec6502c6074dceb41
-
SSDEEP
3072:qvw9HXPJguq73/IKBWymgdS7dmZtWSUXnWi:qvKHXPJi73wAVU7d2tNUH
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
da4d3e14116ce6d8a5dccd507ee9a68d_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5