Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2024 04:01

General

  • Target

    3316a2dd4aca7e1b6a5f9a0ad24917e3_JaffaCakes118.docx

  • Size

    7KB

  • MD5

    3316a2dd4aca7e1b6a5f9a0ad24917e3

  • SHA1

    52c8e302fb97fe9f14a5a53f77e6bd741a38f652

  • SHA256

    8d57266c30e8dcc5eb7a5af4825b9c9e4e51ebca22e697b06ccdeaee2a612aec

  • SHA512

    133742bdeda2d4132353faae6aa9e635136912facf54f9e6582ca4a07674e082cb14d899341b0b69255d95e52e6a47db413002ff3ee389f020cb6f683d843880

  • SSDEEP

    192:EWauI1n2jaC1HsOnSbHUu1erXg0zYxALIDuo/J7uAZl:EWald2OC1MDLv1erXbzuALloh7uQ

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3316a2dd4aca7e1b6a5f9a0ad24917e3_JaffaCakes118.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2300

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B8EC7A03-E095-4E01-94BB-9D76D82C89A7}.FSD
      Filesize

      128KB

      MD5

      7de954934e1f8bc349d445a50c5793af

      SHA1

      b416a70e7c942f6ffde6278dad0048176d680822

      SHA256

      a757e5cf28f83b73b5e3c9a056b94d5f545ae4029ae55793e8577903158e3e52

      SHA512

      f4595a716ec81505102af152a8c1eac6e3994ea12db4e176d75734e056e3b29f02879b44651298fba100d2e89ae885556e588053766e0da244bd584bc3d3ddf5

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      678c77882c8016437c41a561a6ebee71

      SHA1

      ce42020a015a6f03b8d405f67bef8a4c7cad196f

      SHA256

      fb1c0d8925a15e9458ba12dd1d5564597fadddf07bab18ba2d9b5bb3377917ec

      SHA512

      e063e24a1e8d2dbbcaa9ebf6a3fe317f0b34e4cf7ed2a3ddb1fd747e0af665bd731bb30b14944fedd25657c193439d22db6523e09a2cd90cb78f3993f2888c27

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      49f1f3a7d2c4afe0f5a7a788f3227cff

      SHA1

      31a07f980ca7d9a5255e9c81440eac108ca1d9fb

      SHA256

      14ef2bb713331a14d70e46eabfae2870c880adb8c70d6773ef5cca8ba7f2db5c

      SHA512

      98d0898ffe7be420605d8a5dcd2a42f8044285dca632ed7b6814a7e88cb8f4cf78a7d2a7055b4efd9f41763dbbd4b0295975ebab69ec791f5112c92ee4dba4bc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{98C2BD2C-FED2-42C2-AF0F-C32EDEB29DF3}.FSD
      Filesize

      128KB

      MD5

      61c06df91553ec2d136bf7a642184b87

      SHA1

      08bc0ecc2a9697bacbf66bc1d06cab52586b8048

      SHA256

      4436d2bf8b5dc619aa08911bf123ea2b7d0e80ac16fa7f09a2709e5f17795595

      SHA512

      c347e8dd94dbc5769b51d514b763400af5d6ef290594124c3ed43882b0c93c0e8d938f5bed4a5bbaa6b21844fb36b40cfd516577fa52b7b259f5ad6f0bd38106

    • C:\Users\Admin\AppData\Local\Temp\{B551190A-DA89-4AE0-8FCF-3E072BBB37BE}
      Filesize

      128KB

      MD5

      b50684649fc5245be92a123fbd49909d

      SHA1

      fc3c9baa31d8266b8f3c25e423de0c689921fb7d

      SHA256

      2e22e30fb4c81e3debe20cf21e89f28ce72d3fbee2ca4d077bce67b629fc6798

      SHA512

      ed479746f6244f4b8286726e2feb23c940f9586ff333842e26c5a500a269ab05cfd1257a5ebb95fffc1ea6c3eee41479c563ccb2594119bbb20a8f8e1c08300f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c1dbe28dab677c0951633ebb000c53df

      SHA1

      2f6c227328aa2439d76a8cd2a4ec190548bd9eb8

      SHA256

      f7cd29d8a339df4189102b24213a4c730c3fc414835ae9beeb2dbb6fa8d2081c

      SHA512

      73843d7167541ca59670dc31250c8e3e18c9ec06d4c280d5de6ba109d96633bb602fdd307e2a45b510b8134ac5faa41c0c3667798c09499dcaa2dbcfc3e4d130

    • memory/2208-0-0x000000002FBB1000-0x000000002FBB2000-memory.dmp
      Filesize

      4KB

    • memory/2208-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2208-2-0x00000000712AD000-0x00000000712B8000-memory.dmp
      Filesize

      44KB

    • memory/2208-65-0x00000000712AD000-0x00000000712B8000-memory.dmp
      Filesize

      44KB

    • memory/2208-105-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2208-106-0x00000000712AD000-0x00000000712B8000-memory.dmp
      Filesize

      44KB