Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 01:02

General

  • Target

    1eea717f1a4eab39a53621a99e1e2466_JaffaCakes118.doc

  • Size

    33KB

  • MD5

    1eea717f1a4eab39a53621a99e1e2466

  • SHA1

    8526e4a11eac226d3c3b04f9f7cc688a3aa51046

  • SHA256

    6c8373c2ee7c3a2e9954fd6b790f30fe897debfc4a6716c31bf40a18e92c9530

  • SHA512

    1ca232b4fea2447b58c6baca2dd1ac1cfa02a9f22de21a56c3d1ed4d3fd221cea8269a4e683b784b0428d96c498d8b8a978d1cafd3c7ffb514689303572459c6

  • SSDEEP

    192:g2AZNYl8esirLT42zRaQF5kitEnhQbwbHxscY4IZ0j97QDa:g2H8esX2da+kitYhxIZ0j9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1eea717f1a4eab39a53621a99e1e2466_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      24KB

      MD5

      175447d5ce57e482d342ae2c25c9ffb6

      SHA1

      cb1b214f6d268fe4223e04e216f3891a672bd35c

      SHA256

      ecf58556a95b28603fb62d81c6fc900f0e62222039d9d20cfc15e291a513e06b

      SHA512

      4e69211dfeb9af4fb95437383ad05af4b5eecc827debc2475a2d6b4dbcb7aa9d9d88fdeeb6d53a29a8ba6d3afabaf3ec1f99e3f2a5b58df53a65ea149c8eec74

    • memory/1268-0-0x000000002F5F1000-0x000000002F5F2000-memory.dmp

      Filesize

      4KB

    • memory/1268-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1268-2-0x000000007124D000-0x0000000071258000-memory.dmp

      Filesize

      44KB

    • memory/1268-8-0x00000000004B0000-0x00000000005B0000-memory.dmp

      Filesize

      1024KB

    • memory/1268-14-0x000000007124D000-0x0000000071258000-memory.dmp

      Filesize

      44KB

    • memory/1268-15-0x00000000004B0000-0x00000000005B0000-memory.dmp

      Filesize

      1024KB

    • memory/1268-30-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1268-31-0x000000007124D000-0x0000000071258000-memory.dmp

      Filesize

      44KB