Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
458dfb83e62f5836d805c5468fe914b0_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
458dfb83e62f5836d805c5468fe914b0_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
458dfb83e62f5836d805c5468fe914b0_JaffaCakes118.doc
-
Size
480KB
-
MD5
458dfb83e62f5836d805c5468fe914b0
-
SHA1
c14f2aeae536cc1ddd250e1ef7b84dc3d8591feb
-
SHA256
40157b77a4459e2f49914cd3ede7bf239e8606cffd2d6424cefd4716de2a6a96
-
SHA512
7d0ce7771e41b4ab953dd29948948d909f45fde6310827dcbc4037aa99b5128a28134449cf3ade60bdf2a74d7589c68240b95cefa434765fd67a54fd4ddb1b74
-
SSDEEP
6144:HbXUr2JjZ6AS9G99e6xKduKht3v+J90CX/j7dQELhga4n67evcE/erYz:HDZHS9G9g6xkuq29lL7dYa4nKSc+es
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4480 WINWORD.EXE 4480 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE 4480 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\458dfb83e62f5836d805c5468fe914b0_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e