Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 23:43

General

  • Target

    0ab09e9e9a616835c6ee34d460f2f636_JaffaCakes118.doc

  • Size

    214KB

  • MD5

    0ab09e9e9a616835c6ee34d460f2f636

  • SHA1

    1707d8e5d614cd605514745235373eaa7d0b882c

  • SHA256

    6a31245fbfca703f971222d092fec0fc06776ebe8e2f8f154976b6fbdcf72de6

  • SHA512

    8b991b9fbf613dd2eaea4073c6e67e9a9e3e76867b3251e19d3074fcee8707965b321b60f8686531040180a390714cc66ded871ed1219e1c9cbca67e429645f0

  • SSDEEP

    1536:2B445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ55+a9rkLShGkVAelnXW:222TWTogk079THcpOu5UZ2WhGMlnuj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ab09e9e9a616835c6ee34d460f2f636_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2852-2-0x00007FFC82710000-0x00007FFC82720000-memory.dmp

    Filesize

    64KB

  • memory/2852-1-0x00007FFC82710000-0x00007FFC82720000-memory.dmp

    Filesize

    64KB

  • memory/2852-4-0x00007FFC82710000-0x00007FFC82720000-memory.dmp

    Filesize

    64KB

  • memory/2852-3-0x00007FFC82710000-0x00007FFC82720000-memory.dmp

    Filesize

    64KB

  • memory/2852-0-0x00007FFC82710000-0x00007FFC82720000-memory.dmp

    Filesize

    64KB

  • memory/2852-6-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-7-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-5-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-8-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-9-0x00007FFC806B0000-0x00007FFC806C0000-memory.dmp

    Filesize

    64KB

  • memory/2852-10-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-12-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-14-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-16-0x00007FFC806B0000-0x00007FFC806C0000-memory.dmp

    Filesize

    64KB

  • memory/2852-15-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-18-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-17-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-13-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-11-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-33-0x00000299036B0000-0x0000029904680000-memory.dmp

    Filesize

    15.8MB

  • memory/2852-34-0x0000029905990000-0x0000029905B90000-memory.dmp

    Filesize

    2.0MB

  • memory/2852-66-0x00000299036B0000-0x0000029904680000-memory.dmp

    Filesize

    15.8MB

  • memory/2852-67-0x00007FFCC2690000-0x00007FFCC2885000-memory.dmp

    Filesize

    2.0MB