Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-04-2024 00:19

General

  • Target

    624940ad6f93cfc1abeaef4ebe749aa1_JaffaCakes118.docx

  • Size

    10KB

  • MD5

    624940ad6f93cfc1abeaef4ebe749aa1

  • SHA1

    7df9895afaeb4a1b0b8fd10b522de11b44b9b446

  • SHA256

    4f527048b2c6a74cf4292ea429232939b72dd7c45ff5985f94cc142f79058149

  • SHA512

    7fe4cb2d28a6f91b2ef1a681e879274fb5cdc058b25d622f22fc331062b94a18f9f958f13d5409e69223270bf56098885f9a603f04d18d49393df19324439ad7

  • SSDEEP

    96:kHcIMm57P6z8XOEB7dmGJa6T/n/jNTTvCX0iEpZ4W/JWp+I5aT9HkLqBpN6iAEL3:ScIMmtPp8G/btCX0iSOTamWBXfc3z3Op

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\624940ad6f93cfc1abeaef4ebe749aa1_JaffaCakes118.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2636

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      fbab7ea3d0dc5f7f41c1871004146b6b

      SHA1

      2be3e2f6b5d804db98f7cdb08119b9ffeeb24253

      SHA256

      165aa33a041ca375b4240d4c4c6600e6442f564c4c09c22a4d22c1d6623702ce

      SHA512

      059927056e451a33646107d8eb98743584f75701dbb91fb90c302570a172d74813263007f88c6f8ea26d98e96db8c3c2898d3e47645af3b99844cb2f1989868b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{294A39AC-6EDB-48A0-A75A-67209CDA04E9}.FSD
      Filesize

      128KB

      MD5

      b1690c5874ff06b4f903be7cdc7d34d4

      SHA1

      6672e8232c2a5da16b6a17abf5477d98cadc262c

      SHA256

      d22e3b5745bfe16694b3ceed92a03e73f375fa921a252c4306ffc7eb00c1e60f

      SHA512

      098afa1b4e3c4eff5309fc0d8fce7480f131cc49ab6d37b80d50c9748ea0c4f50871df5db17f19ceaf34ae496ab6365e2a20fc13f136159133f517b8f7d2b173

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      1c6c32387434819fdd0a264ccd3624a9

      SHA1

      4cc517622ec01bf3a15879dc87dfef03deb681a5

      SHA256

      fa01aa4faf978d761bc3f9d06642cff76265fb6af8d535c787e480ef42d8acfd

      SHA512

      f28fd1dc4727f0cc04f2ec415fc84ad650ea6f7c0539c1b973e3115f8a59a74068995f2ad06a984fa221656039fa330b7865e41bc35c79eb7ace5a510401ef89

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{1F0952D4-BDFC-4B38-940E-935E31B02A46}.FSD
      Filesize

      128KB

      MD5

      91cc0279d53bf60e85584ae97296fe68

      SHA1

      3ce880561939cab037bc7fd7ce800e4c71cda177

      SHA256

      fde0f4cd954dd49b4f810893f338e1c2737610e31b5d2b9749c80af3be11a96e

      SHA512

      82f86a4bf9fe80fd23186a92ba64174a93a6bf64225b264b06995fd37cffc5888b0a77f7ad8b8502a53e74fd3b00c400617e19478e4c781a7523fb37d55debd4

    • C:\Users\Admin\AppData\Local\Temp\{0463E74D-D2EB-4C2A-B5EF-887B75699676}
      Filesize

      128KB

      MD5

      2b89c7d07ad7908af71117a359b01e09

      SHA1

      f1ed26915497338d080f8f0a27d41521caed8a62

      SHA256

      5354b896289079ebf1be9c8572b355c54d869f010febde117e0b4c028ecf5cc6

      SHA512

      dc71cecebdc9fa8b4b2ef92f411c5bd5ddbc4137e2490fda350b8d92dd2e8d3f31d1c36dac9ebb7b30d19b8011b68c97a9f9ac23288996336b19ff8de22d44fd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      05fb8771a8dd904b252544eff16cc5d8

      SHA1

      9920839ce99c61d027c54e8231cdcbcb9d295951

      SHA256

      46fb684121232a437ffb9d4079b4c0ee97096bc07bce79bdf90b1a14d5c77122

      SHA512

      241bcc77def0efed59c3c73f309d560fca38708f285d7b87b0819d3666e242f76294108d81b894d820dabd07fc5a34de693c3f8f9dd981834bbe236b99bac2db

    • memory/1736-0-0x000000002F051000-0x000000002F052000-memory.dmp
      Filesize

      4KB

    • memory/1736-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1736-2-0x000000007130D000-0x0000000071318000-memory.dmp
      Filesize

      44KB

    • memory/1736-5-0x000000007130D000-0x0000000071318000-memory.dmp
      Filesize

      44KB

    • memory/1736-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1736-89-0x000000007130D000-0x0000000071318000-memory.dmp
      Filesize

      44KB