Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 16:27

General

  • Target

    0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc

  • Size

    133KB

  • MD5

    0a7b3a75b84d88b6b57ae71c87fc6e40

  • SHA1

    ced3cc50ea67601cf7bf72b5969bc368e45f1f09

  • SHA256

    b3c801531e058de3449eae1a0e996ec65311db9c09924021c647acf792ab3641

  • SHA512

    90a00aa3de7f1b544cc8ef8ac244262a63f032ad97d79ca5f36d8baaec478ef05615426151b6bde0cf39acabae8f53e277f124ae514503345df1be547dab215c

  • SSDEEP

    1536:Qe770K/1JVf9H1KrNDiBtYhLO/nqB2/TWiDUl:Qe3bJB9H1K9i8LOGGTWi0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2144-0-0x000000002F0F1000-0x000000002F0F2000-memory.dmp

    Filesize

    4KB

  • memory/2144-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2144-2-0x0000000071B1D000-0x0000000071B28000-memory.dmp

    Filesize

    44KB

  • memory/2144-5-0x0000000071B1D000-0x0000000071B28000-memory.dmp

    Filesize

    44KB