Analysis
-
max time kernel
136s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 15:11
Behavioral task
behavioral1
Sample
502535c7edd051cd395f1bd1de2d06a8_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
502535c7edd051cd395f1bd1de2d06a8_JaffaCakes118.doc
Resource
win10v2004-20240426-en
General
-
Target
502535c7edd051cd395f1bd1de2d06a8_JaffaCakes118.doc
-
Size
99KB
-
MD5
502535c7edd051cd395f1bd1de2d06a8
-
SHA1
3f0f826c0bb16beccd80df17f027187c8fe9325a
-
SHA256
72efb7e8f9eeb120ac7a4013c100a82b6a5acdc9c653896cb8f47b449a53e398
-
SHA512
0ba37b1f6d299ca18a04c3afc925492891efcde22d9f56d6b7c302aa0eceac3c760e32be36f72f682611bc44cee4e7b12f2f5b591485266054488c4ae6aed66c
-
SSDEEP
768:T2QBJYsUpCXqMgFrUmHsz3Mre+nAV5tUppfffpNjY6gL5vSToClXdikvTkP8blsh:T2srgFrUmHszqjAGjY6/oetiATkI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\Wallpaper = "\\Jon.html" WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2992 WINWORD.EXE 2992 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\502535c7edd051cd395f1bd1de2d06a8_JaffaCakes118.doc" /o ""1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
98KB
MD5603ede8158360ea92cfc161ef826952a
SHA1676feb017fb02c28a5adcbf2e7c5f859721951ee
SHA2567f817c6f7fe216fcb61d4fae3ee25f357bdad8f4c2caf100e71e519682dadab8
SHA512ec88ecee240ce38bd7c995b152b078d090258b0e35ba28e22bc8fc47df48f1904cf074758a65e4715d3facf34a6ca71f2ca4006fd4a2e575532bb8f6b1067d71
-
Filesize
29KB
MD5bd5bb0153e4e3044b7db66a82786f1b6
SHA1dd775ef2ee004ac7dda4900e5d6b6f3cd817d9f3
SHA2564853538faf2f7e5947d10d125885820868dde7f417d68ed4be67de17abade57c
SHA512b0352e7bc9160c3454d7bcddfbcf5eae6401f2a608b53e8f99192c9df03b86dcbe9b7756a5da8344fb56613ac41f1ee4cb11e614f7d0a53fbc254a1a3135d248
-
Filesize
88B
MD53e1763fd396897c545e28b10155f2f8b
SHA1798404272728cc90edc515a501dfa6c6d8d3667b
SHA256750581b2a67d99d586c5899e50cba343c3007cb90a676a78b7cd4016a39f9146
SHA51250d70f86be6e0c59735985298b50b0a6d0a551bc600df7183ddb88a21fb7b41f4c1ab42abd120ef31581ac25ea2b8cc1e9d15dd5e821046ab2d73c36eb613ed3
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84