Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 01:17

General

  • Target

    5c7089888856903ca4fd304692e4559e_JaffaCakes118.rtf

  • Size

    43KB

  • MD5

    5c7089888856903ca4fd304692e4559e

  • SHA1

    f7cf80e3f4a37d52b4afb28de6dc1819dc0ef404

  • SHA256

    ffa785b173c18f00221b6f3b8080d9b6707ff83749e572a3c9a80f7a39e84a4c

  • SHA512

    2ae357fb4db07e24b09574626a74a7662720d4ab7b1c801a163a6080cf4a1bbd3ff33d6659edf26aed7c86f4ad60724671d19d4c3f67c4057cd272977723f4d4

  • SSDEEP

    384:qcJ3oarN79ozVzEFo4rQ0B+jTQpkCQLwRIti6rGsoUwEAG2DaGd:qcJ3G4rQ++gpsLwRISU4d

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5c7089888856903ca4fd304692e4559e_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\45EBFE6B.emf

    Filesize

    1KB

    MD5

    f0874769bd967c53fc3fe06d4c50da89

    SHA1

    67f17758c302c8051f45274d18a163ccfc663455

    SHA256

    a02eac0df0e9b96e30e3adc956d04a9c11a5b2d788750ce88e735140524e1797

    SHA512

    011b181811dfa0da153f12f05f860b87d200b1f5367ceb454ef32fbac171bca5a82ed783bec3cb82ae2de109f589ad6b304472e24749599fc20a0f919891939b

  • C:\Users\Admin\AppData\Local\Temp\TCD460F.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • memory/1356-6-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-12-0x00007FFCBC190000-0x00007FFCBC1A0000-memory.dmp

    Filesize

    64KB

  • memory/1356-5-0x00007FFCFE9AD000-0x00007FFCFE9AE000-memory.dmp

    Filesize

    4KB

  • memory/1356-3-0x00007FFCBE990000-0x00007FFCBE9A0000-memory.dmp

    Filesize

    64KB

  • memory/1356-8-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-10-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-9-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-15-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-13-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-7-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-4-0x00007FFCBE990000-0x00007FFCBE9A0000-memory.dmp

    Filesize

    64KB

  • memory/1356-0-0x00007FFCBE990000-0x00007FFCBE9A0000-memory.dmp

    Filesize

    64KB

  • memory/1356-11-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-17-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-16-0x00007FFCBC190000-0x00007FFCBC1A0000-memory.dmp

    Filesize

    64KB

  • memory/1356-14-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-19-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-20-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-21-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-18-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-38-0x00007FFCFE910000-0x00007FFCFEB05000-memory.dmp

    Filesize

    2.0MB

  • memory/1356-1-0x00007FFCBE990000-0x00007FFCBE9A0000-memory.dmp

    Filesize

    64KB

  • memory/1356-2-0x00007FFCBE990000-0x00007FFCBE9A0000-memory.dmp

    Filesize

    64KB