Behavioral task
behavioral1
Sample
eb9b61ddbd42a4c2e6ca2f2e88925731_JaffaCakes118.doc
Resource
win7-20240903-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
eb9b61ddbd42a4c2e6ca2f2e88925731_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
eb9b61ddbd42a4c2e6ca2f2e88925731_JaffaCakes118
-
Size
241KB
-
MD5
eb9b61ddbd42a4c2e6ca2f2e88925731
-
SHA1
d38613c32ed742a18be6b646e0bc532a38b91043
-
SHA256
3ae8a025d4bb0ffddf461402c8b10d37b1698f9060526c647557942ecebf3d9a
-
SHA512
11062b058aff9ba10dfa8c6f0a01b139d7283c604a9d616aa697936d4585ee4efb2cc90a62622689167f7068fbb03326583f59db01209117f4b078a4350ac06f
-
SSDEEP
3072:Evw9HXPJguq73/IKBWy48dSAhDUiF/ZABbGuBuTVJH:EvKHXPJi73wArUA3/qPB0H
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
eb9b61ddbd42a4c2e6ca2f2e88925731_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5