Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 16:51

General

  • Target

    50803379c862897b497e96fb6f5b3f48_JaffaCakes118.rtf

  • Size

    709KB

  • MD5

    50803379c862897b497e96fb6f5b3f48

  • SHA1

    0ca45c28c48d06a9349ac1edd3f2d0430d254768

  • SHA256

    b2ed4938e2e41c6015a953684f2e3a271044a0f7ede57e202e0026d492bf7c5a

  • SHA512

    420561ca82648f81ffd92175454b72d756eadd88c42c2809868da7e17af479e049b9b3283e91017dda0297a83c6c706f5dc29825b75c7ac71aa5797bc32f4f9c

  • SSDEEP

    12288:w1kx0ygplQ/7F3pAklbX5cPLxGOOv3KkDNx0yna:w6x0ygpu/7RpAkp+z7Ov3dhx0ya

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\50803379c862897b497e96fb6f5b3f48_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{3204016F-80A1-400B-9E5F-D3654DA344D6}\inteldriverupd1.sct:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • memory/4848-17-0x00007FF88CF70000-0x00007FF88CF80000-memory.dmp

    Filesize

    64KB

  • memory/4848-2-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-16-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-5-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-15-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-6-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-8-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-14-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-11-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-10-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-9-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-0-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-1-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-3-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-7-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-13-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-12-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-18-0x00007FF88CF70000-0x00007FF88CF80000-memory.dmp

    Filesize

    64KB

  • memory/4848-4-0x00007FF8CF8ED000-0x00007FF8CF8EE000-memory.dmp

    Filesize

    4KB

  • memory/4848-45-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-75-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-77-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-76-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-74-0x00007FF88F8D0000-0x00007FF88F8E0000-memory.dmp

    Filesize

    64KB

  • memory/4848-78-0x00007FF8CF850000-0x00007FF8CFA45000-memory.dmp

    Filesize

    2.0MB