Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 18:15
Behavioral task
behavioral1
Sample
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc
-
Size
14KB
-
MD5
60817a784d7b3576a4f3838daa8577a6
-
SHA1
1079de44fd11812efae7cfd5fae6bc3b29f4bdd8
-
SHA256
6290556440aaf01ba9a11bd6fdf6ac0e7e548829652f517abf3b921650510d9e
-
SHA512
1441557d72a12762ec198c357d203a3d48230ce7b1b1491bcf19e41a7b6d3bef7c08c65be2adbcc3b5ed064b09947748e67c99d00661a98fbf49cc1d7030cc74
-
SSDEEP
192:h2VFt4AqFv8Z6pMzquslF+pcBQ/YskWykIyogPy0jKCNaW:hatsN+ns+p4EktkIyogPy0jJ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3380 WINWORD.EXE 3380 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
WINWORD.EXEpid process 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\60817a784d7b3576a4f3838daa8577a6_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3380