Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 23:24

General

  • Target

    222f506621f936e607a82d5a76af41a3_JaffaCakes118.docx

  • Size

    11KB

  • MD5

    222f506621f936e607a82d5a76af41a3

  • SHA1

    827604f58b8503a98d29625eccdbc9715145d6a6

  • SHA256

    76595902f942e8b563bba74480f2ea822c6b4db8949993a7fb4711c8a92fbef5

  • SHA512

    31a9974bd6802bb8c687b313c105bea166283939a6043b80724ccccf5100ac6f29167a5f649c21e8b6d08e91ec63e7ebfaca55f03494e7d7efd63ece1957a959

  • SSDEEP

    192:CtNCWUyn0i13pNXqkOcPiYFLwzvdX6Ptpwjnw+umHBCnVb:aNxUyn0i13LROEiOLkX6Ujnw+3UVb

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\222f506621f936e607a82d5a76af41a3_JaffaCakes118.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2180

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{9FB09E80-4B3B-4D41-867F-1D40FBF490EA}.FSD
      Filesize

      128KB

      MD5

      19a1816e0c7dbc28fc6e20ef70475ef5

      SHA1

      d56c2035522c127ab30c02a6a96efde8484498e1

      SHA256

      57d5f2ddf65d49964250fab2f1bf3abeb8b30eddc45442641a829fb9a62bdacd

      SHA512

      dde92244f09e6e955e709737f54cedc30e63ad4b1e583c51bbf936a9bf74ada79e7457daee79f8e2c2555bf84037a4805318e6d1e273db87bdd39633b6ce4b96

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      3679e6694a514c86ee66753fedfc10c3

      SHA1

      27084829f6d15d97b45fd00b29c19290cbf76b67

      SHA256

      2a8d1d6cc59c28bee5e808b34ee105402181ae496e474cdcfa12a4c8d2d28f62

      SHA512

      bbb37e45bcd4a68d2f3ba9429fce942fe123b796a333fd1df0a21b3f28833ce2c67809238d04739fcdc5b2eba126e88cea7c54cb19259a06ce0497d06f8282d8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{815EB3F4-D2D9-42C0-98E0-6ADD8854FFE1}.FSD
      Filesize

      128KB

      MD5

      7b0c4a66340507355629888d4a60cb71

      SHA1

      578272494eceff34bdbb7b02bce896ed9d7335c5

      SHA256

      f73505cb9010942dd00a6d990f0b93e7226e209e471ee9b16ce2d7b38ab5b75b

      SHA512

      8592b95bd376e730a2e90b301eb441bcd1310fb8ecaa09ea168de32f8a0ceecdd08e5d3d8d70fa0fe9aacf214946cbd67564bd4f7d12389353cd69755883b438

    • C:\Users\Admin\AppData\Local\Temp\{85939793-B5F8-4DF8-B267-D00F6DE91CCE}
      Filesize

      128KB

      MD5

      7fa55f0d3469f3825864f78ac6480153

      SHA1

      287f2f4c58b04edcbdf1a8eafb2fe07b19fa90ee

      SHA256

      c63298e215630ba6193b9cedf2cf49ea2d024016968273b33c4528d42ed5b80f

      SHA512

      d03f1e343088672421c53241c9a45101c2b657a1a12db574a7c376e035f6a453beb8141e04ee2c7bfa5bc87cec9fbf42096928cb3dd4e9ddf5101be143a657e7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c327e9f3e33aedc950e3ab5a749ed5c5

      SHA1

      43c5d3b265ea5604a04a34adb6a0fd33762436c2

      SHA256

      b97a51dd361212533c07888e74b8ea3d93e788f50642f83a6922c2941416f689

      SHA512

      ae905e415c9e234a4ecb2f81d533c91d7a2bfbc93602d284b020c17f925cd8b8ca66544359f1677028b264f27d2e0a2b48c9d232157bffced46a090153f83073

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2232-0-0x000000002FC41000-0x000000002FC42000-memory.dmp
      Filesize

      4KB

    • memory/2232-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2232-2-0x0000000070C6D000-0x0000000070C78000-memory.dmp
      Filesize

      44KB

    • memory/2232-77-0x0000000070C6D000-0x0000000070C78000-memory.dmp
      Filesize

      44KB

    • memory/2232-97-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2232-98-0x0000000070C6D000-0x0000000070C78000-memory.dmp
      Filesize

      44KB