Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 16:27
Behavioral task
behavioral1
Sample
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc
Resource
win7-20240319-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc
-
Size
133KB
-
MD5
0a7b3a75b84d88b6b57ae71c87fc6e40
-
SHA1
ced3cc50ea67601cf7bf72b5969bc368e45f1f09
-
SHA256
b3c801531e058de3449eae1a0e996ec65311db9c09924021c647acf792ab3641
-
SHA512
90a00aa3de7f1b544cc8ef8ac244262a63f032ad97d79ca5f36d8baaec478ef05615426151b6bde0cf39acabae8f53e277f124ae514503345df1be547dab215c
-
SSDEEP
1536:Qe770K/1JVf9H1KrNDiBtYhLO/nqB2/TWiDUl:Qe3bJB9H1K9i8LOGGTWi0
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4380 WINWORD.EXE 4380 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE 4380 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4084 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:4756