Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:35

General

  • Target

    658ad0ef1f7755ae9435f4261fa291bd_JaffaCakes118.rtf

  • Size

    19KB

  • MD5

    658ad0ef1f7755ae9435f4261fa291bd

  • SHA1

    e11e926713a306bf7a2afe42bf530ef518405a7b

  • SHA256

    00401c233c177621fb2e871eda4c7cf18296830c87b3cfdce4791401f5840d69

  • SHA512

    0d7d1df0865a35f1d2b88c2df8361907a505a2b2f6344a34e3c6c39e82876c5519076315e35f6f42bfed9e2fab38a60d5875c71ee29d6bea0f1542e57d09366b

  • SSDEEP

    384:vHxcWi1mN0xXYaNN56xiYIu46PioH2ltdtd3gm:ZcLMN0xXFN6xrIGPi7tdX3gm

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\658ad0ef1f7755ae9435f4261fa291bd_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2064

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD912C.tmp\sist02.xsl
    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • memory/2064-7-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-533-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-5-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-4-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-3-0x00007FFBBDAAD000-0x00007FFBBDAAE000-memory.dmp
    Filesize

    4KB

  • memory/2064-1-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-6-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-8-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-9-0x00007FFB7B850000-0x00007FFB7B860000-memory.dmp
    Filesize

    64KB

  • memory/2064-10-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-534-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-2-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-15-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-14-0x00007FFB7B850000-0x00007FFB7B860000-memory.dmp
    Filesize

    64KB

  • memory/2064-13-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-17-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-16-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-0-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-508-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-530-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-531-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-12-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB

  • memory/2064-532-0x00007FFB7DA90000-0x00007FFB7DAA0000-memory.dmp
    Filesize

    64KB

  • memory/2064-11-0x00007FFBBDA10000-0x00007FFBBDC05000-memory.dmp
    Filesize

    2.0MB