Behavioral task
behavioral1
Sample
f0c74daf731e37fe9297be64907bdea3_JaffaCakes118.doc
Resource
win7-20240903-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
f0c74daf731e37fe9297be64907bdea3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
f0c74daf731e37fe9297be64907bdea3_JaffaCakes118
-
Size
242KB
-
MD5
f0c74daf731e37fe9297be64907bdea3
-
SHA1
831a27e69b9523c452fad09e1c0e7fc59d55d04f
-
SHA256
bab69bb6bf45ff890f0bd0a614e310c971e196da1c0b3251471613c39d84a61a
-
SHA512
0411820abe42109245923fefa3cc6939a6b42c415907ac7d9439741aa6730fb6ad52dbb3b6be39f28322be863e7b1234b051449d64e5d29fa797d6c16f21b2db
-
SSDEEP
3072:O9svwvw9HXPJguq73/IKBWyld6dSXljAX1W8:ovKHXPJi73wAsUVjkW8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f0c74daf731e37fe9297be64907bdea3_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5