Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 09:58

General

  • Target

    2452ad99563cbe530e327ceff04bce34_JaffaCakes118.doc

  • Size

    11KB

  • MD5

    2452ad99563cbe530e327ceff04bce34

  • SHA1

    093fa64867a535b558625d35b231f0fadf2b9499

  • SHA256

    53c0f82a6387a392bc3f5453307542e469013a5db884342d106ddcc4aa7b5f76

  • SHA512

    2319d481710982e8a7ff54ec1b0d5d79d9177e7931c83dc71cfe9e6ff1eb3cb80c8bf04968acf55b67ead934aaf9f168badfc650001ed26ba0ff30e06000edc4

  • SSDEEP

    192:hzE0jqBwdEt51/fKEab3uSzUnK/tED2XuK0Epa:1E0jquEtj/fHabHUnK/c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2452ad99563cbe530e327ceff04bce34_JaffaCakes118.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3024-0-0x000000002F0A1000-0x000000002F0A2000-memory.dmp

    Filesize

    4KB

  • memory/3024-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3024-2-0x000000007198D000-0x0000000071998000-memory.dmp

    Filesize

    44KB

  • memory/3024-5-0x000000007198D000-0x0000000071998000-memory.dmp

    Filesize

    44KB