Behavioral task
behavioral1
Sample
dcc7631ae96dae256593cda6f8d40236_JaffaCakes118.doc
Resource
win7-20240903-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
dcc7631ae96dae256593cda6f8d40236_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
dcc7631ae96dae256593cda6f8d40236_JaffaCakes118
-
Size
213KB
-
MD5
dcc7631ae96dae256593cda6f8d40236
-
SHA1
2b47ca93699c37ae85384b497b200983150465a2
-
SHA256
2814d85d70a8b541cf8187ee619475d292ceac536bda472cfc21c5fb9c663025
-
SHA512
43ab8052e79e26353110bab251a520015818d0b4dfc2bd9e0b8c2b68a56580f61a9abde85991b7620863cfa5b11208cc8bc41e756d58e88c1c6f0c5ad686bd66
-
SSDEEP
3072:olwI/6xgitF/6j4qlHtKvrwfz0TtclnRvo2Mi:ol5/6xgcC4qlNL/Rvoti
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dcc7631ae96dae256593cda6f8d40236_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5