Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 23:24

General

  • Target

    50803379c862897b497e96fb6f5b3f48JaffaCakes118.rtf

  • Size

    709KB

  • MD5

    50803379c862897b497e96fb6f5b3f48

  • SHA1

    0ca45c28c48d06a9349ac1edd3f2d0430d254768

  • SHA256

    b2ed4938e2e41c6015a953684f2e3a271044a0f7ede57e202e0026d492bf7c5a

  • SHA512

    420561ca82648f81ffd92175454b72d756eadd88c42c2809868da7e17af479e049b9b3283e91017dda0297a83c6c706f5dc29825b75c7ac71aa5797bc32f4f9c

  • SSDEEP

    12288:w1kx0ygplQ/7F3pAklbX5cPLxGOOv3KkDNx0yna:w6x0ygpu/7RpAkp+z7Ov3dhx0ya

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\50803379c862897b497e96fb6f5b3f48JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{7A081AF2-9B8B-4EF4-B7CB-55FADB425001}\inteldriverupd1.sct:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • memory/4196-10-0x00007FF8B4050000-0x00007FF8B4060000-memory.dmp

    Filesize

    64KB

  • memory/4196-1-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-13-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-4-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-5-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-6-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-7-0x00007FF8B4050000-0x00007FF8B4060000-memory.dmp

    Filesize

    64KB

  • memory/4196-8-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-12-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-0-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-75-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-2-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-9-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-14-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-15-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-3-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-42-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB

  • memory/4196-72-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-73-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-71-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-74-0x00007FF8B62F0000-0x00007FF8B6300000-memory.dmp

    Filesize

    64KB

  • memory/4196-11-0x00007FF8F3B50000-0x00007FF8F3E19000-memory.dmp

    Filesize

    2.8MB