Behavioral task
behavioral1
Sample
fd33327e82f567d9cb7f522a75c00492_JaffaCakes118.doc
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
fd33327e82f567d9cb7f522a75c00492_JaffaCakes118.doc
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
fd33327e82f567d9cb7f522a75c00492_JaffaCakes118
-
Size
242KB
-
MD5
fd33327e82f567d9cb7f522a75c00492
-
SHA1
761e7625c196533a7f576da3e16f6e7321cb57ad
-
SHA256
fbebd42d07a49e68d39f972fca3457316cb106e3b7c7dfcdc0cc67a51601f697
-
SHA512
cae77ff3de2805ed236a04d0a8bfb8f50e507c039227f50366b56dc16b015c77086cf6771dc49bdf4b1f2ebf251179307916ab944a5392b1fd41579e3d7ab07f
-
SSDEEP
3072:Vvw9HXPJguq73/IKBWy4CdS5BYhNPIn5hH5o:VvKHXPJi73wA9U5K/I3Zo
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fd33327e82f567d9cb7f522a75c00492_JaffaCakes118.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5