Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
10835bbaba51e62af438366f2128e5f5_JaffaCakes118.rtf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10835bbaba51e62af438366f2128e5f5_JaffaCakes118.rtf
Resource
win10v2004-20240419-en
General
-
Target
10835bbaba51e62af438366f2128e5f5_JaffaCakes118.rtf
-
Size
1.3MB
-
MD5
10835bbaba51e62af438366f2128e5f5
-
SHA1
0763eb8bfb1439878c4c02ce4e950c07275ebf02
-
SHA256
4195ef696648e960bcd28f15347ed3c6454b8dec1bbe5adc54c9a341c1070e89
-
SHA512
d37cd3e3f80ca2525aadf73b964331109ae7b9aca4997b946fa83aaff8a1a9622ea8d59644f81ef36ae59ef848d9dfc327ffcfea15c3d97edfa3985d34487aa3
-
SSDEEP
24576:ndHDcq47d/mF6dxhXwsnfPf+5+XP0WF0ncXr4r/UjZLjkr12JzQf/jpYzQcwwKs4:9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{6F03673E-31D5-4109-9619-3479257A0D1D}\intel.scr:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{6F03673E-31D5-4109-9619-3479257A0D1D}\inteldriverupd1.sct:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 208 WINWORD.EXE 208 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\10835bbaba51e62af438366f2128e5f5_JaffaCakes118.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:208