Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
5c595e6e7a518e6e59781233b9f0a0fa_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c595e6e7a518e6e59781233b9f0a0fa_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
data1748814.rtf
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
data1748814.rtf
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
data2607577.xls
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
data2607577.xls
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
data865134.pdf
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
data865134.pdf
Resource
win10v2004-20240508-en
General
-
Target
data1748814.rtf
-
Size
838KB
-
MD5
c7f5c3a2511cb98c24d3dd96692dd9d1
-
SHA1
230e58a20d409c0625533a29cf3256e9b342d239
-
SHA256
6f7bd92726a05557f40bcc6fe2d1cedd37f1fb0d484739d369ed787003d845b8
-
SHA512
564f7493606f05bddcf5c5945a008fa950113cb9926acae16545d085e3232c4a87b77f55485f8e70cc6e57112881f4fd6ac491df8cf96bc483b0cdfbd73f35d0
-
SSDEEP
24576:2fVMB4bd69Xzl3U1zwNivZ1lqy4njfyzEFuLtI8:2tMB4bd6ZzeGiRqy8fyFBI8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1088 WINWORD.EXE 1088 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\data1748814.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1088