Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 23:44
Behavioral task
behavioral1
Sample
489be83c212e2b7726bc0444b3551014_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
489be83c212e2b7726bc0444b3551014_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
489be83c212e2b7726bc0444b3551014_JaffaCakes118.doc
-
Size
244KB
-
MD5
489be83c212e2b7726bc0444b3551014
-
SHA1
d9e9a0f825513ae266743a11dab0265a763c245f
-
SHA256
e849725a88c24cc37f0c658ac02ad39518a55e4e2ec384d635f6a99d9a11cdec
-
SHA512
7a68cc8601c7937481c5d0cc56f2a420332b271fa4233f68e9404a141058a37c138362bfc49c66d8fbc123d3929b0d21438dfd4f5085955d268eb99827f7ef81
-
SSDEEP
3072:Ly5lu3ecReJr+PFGmWt6l7vjTy90icYRk0EBw62cCNzx8LIHlGlSRbYetJh59UJ:LsQ3e3Jr+G76lLjSRk0EBwrDmiYUJxg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4344 WINWORD.EXE 4344 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE 4344 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\489be83c212e2b7726bc0444b3551014_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4344